Feb 9 19:49:15.655155 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:49:15.655170 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:49:15.655176 kernel: Disabled fast string operations Feb 9 19:49:15.655180 kernel: BIOS-provided physical RAM map: Feb 9 19:49:15.655184 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Feb 9 19:49:15.655188 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Feb 9 19:49:15.655193 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Feb 9 19:49:15.655198 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Feb 9 19:49:15.655202 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Feb 9 19:49:15.655206 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Feb 9 19:49:15.655210 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Feb 9 19:49:15.655214 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Feb 9 19:49:15.655217 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Feb 9 19:49:15.655221 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 19:49:15.655227 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Feb 9 19:49:15.655232 kernel: NX (Execute Disable) protection: active Feb 9 19:49:15.655236 kernel: SMBIOS 2.7 present. Feb 9 19:49:15.655241 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Feb 9 19:49:15.655245 kernel: vmware: hypercall mode: 0x00 Feb 9 19:49:15.655250 kernel: Hypervisor detected: VMware Feb 9 19:49:15.655255 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Feb 9 19:49:15.655259 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Feb 9 19:49:15.655264 kernel: vmware: using clock offset of 4376982424 ns Feb 9 19:49:15.655268 kernel: tsc: Detected 3408.000 MHz processor Feb 9 19:49:15.655273 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:49:15.655278 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:49:15.655282 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Feb 9 19:49:15.655287 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:49:15.655291 kernel: total RAM covered: 3072M Feb 9 19:49:15.655297 kernel: Found optimal setting for mtrr clean up Feb 9 19:49:15.655302 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Feb 9 19:49:15.655306 kernel: Using GB pages for direct mapping Feb 9 19:49:15.655311 kernel: ACPI: Early table checksum verification disabled Feb 9 19:49:15.655315 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Feb 9 19:49:15.655320 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Feb 9 19:49:15.655324 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Feb 9 19:49:15.655329 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Feb 9 19:49:15.655333 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 9 19:49:15.655338 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 9 19:49:15.655343 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Feb 9 19:49:15.655350 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Feb 9 19:49:15.655355 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Feb 9 19:49:15.655360 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Feb 9 19:49:15.655365 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Feb 9 19:49:15.655370 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Feb 9 19:49:15.655375 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Feb 9 19:49:15.655380 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Feb 9 19:49:15.655385 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 9 19:49:15.655390 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 9 19:49:15.655395 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Feb 9 19:49:15.655399 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Feb 9 19:49:15.655404 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Feb 9 19:49:15.655409 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Feb 9 19:49:15.655415 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Feb 9 19:49:15.655419 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Feb 9 19:49:15.655424 kernel: system APIC only can use physical flat Feb 9 19:49:15.655429 kernel: Setting APIC routing to physical flat. Feb 9 19:49:15.655434 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:49:15.655439 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Feb 9 19:49:15.655443 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Feb 9 19:49:15.655448 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Feb 9 19:49:15.655453 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Feb 9 19:49:15.655458 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Feb 9 19:49:15.655463 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Feb 9 19:49:15.655468 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Feb 9 19:49:15.655473 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Feb 9 19:49:15.655477 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Feb 9 19:49:15.655482 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Feb 9 19:49:15.655487 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Feb 9 19:49:15.655492 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Feb 9 19:49:15.655504 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Feb 9 19:49:15.655509 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Feb 9 19:49:15.655515 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Feb 9 19:49:15.655520 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Feb 9 19:49:15.655524 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Feb 9 19:49:15.655529 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Feb 9 19:49:15.655534 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Feb 9 19:49:15.655538 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Feb 9 19:49:15.655543 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Feb 9 19:49:15.655548 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Feb 9 19:49:15.655553 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Feb 9 19:49:15.655557 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Feb 9 19:49:15.655563 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Feb 9 19:49:15.655568 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Feb 9 19:49:15.655572 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Feb 9 19:49:15.655577 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Feb 9 19:49:15.655582 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Feb 9 19:49:15.655587 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Feb 9 19:49:15.655591 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Feb 9 19:49:15.655596 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Feb 9 19:49:15.655601 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Feb 9 19:49:15.655605 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Feb 9 19:49:15.655611 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Feb 9 19:49:15.655616 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Feb 9 19:49:15.655621 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Feb 9 19:49:15.655625 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Feb 9 19:49:15.655630 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Feb 9 19:49:15.655635 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Feb 9 19:49:15.655640 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Feb 9 19:49:15.655645 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Feb 9 19:49:15.655649 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Feb 9 19:49:15.655654 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Feb 9 19:49:15.655660 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Feb 9 19:49:15.655665 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Feb 9 19:49:15.655670 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Feb 9 19:49:15.655674 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Feb 9 19:49:15.655679 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Feb 9 19:49:15.655684 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Feb 9 19:49:15.655688 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Feb 9 19:49:15.655693 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Feb 9 19:49:15.655698 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Feb 9 19:49:15.655704 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Feb 9 19:49:15.655708 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Feb 9 19:49:15.655713 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Feb 9 19:49:15.655718 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Feb 9 19:49:15.655722 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Feb 9 19:49:15.655727 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Feb 9 19:49:15.655733 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Feb 9 19:49:15.655740 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Feb 9 19:49:15.655746 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Feb 9 19:49:15.655751 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Feb 9 19:49:15.655756 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Feb 9 19:49:15.655762 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Feb 9 19:49:15.655767 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Feb 9 19:49:15.655773 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Feb 9 19:49:15.655778 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Feb 9 19:49:15.655783 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Feb 9 19:49:15.655788 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Feb 9 19:49:15.655793 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Feb 9 19:49:15.655798 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Feb 9 19:49:15.655804 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Feb 9 19:49:15.655809 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Feb 9 19:49:15.655814 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Feb 9 19:49:15.655819 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Feb 9 19:49:15.655824 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Feb 9 19:49:15.655829 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Feb 9 19:49:15.655834 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Feb 9 19:49:15.655839 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Feb 9 19:49:15.655844 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Feb 9 19:49:15.655850 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Feb 9 19:49:15.655856 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Feb 9 19:49:15.655861 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Feb 9 19:49:15.655866 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Feb 9 19:49:15.655871 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Feb 9 19:49:15.655876 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Feb 9 19:49:15.655881 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Feb 9 19:49:15.655886 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Feb 9 19:49:15.655891 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Feb 9 19:49:15.655896 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Feb 9 19:49:15.655902 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Feb 9 19:49:15.655907 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Feb 9 19:49:15.655912 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Feb 9 19:49:15.655917 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Feb 9 19:49:15.655922 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Feb 9 19:49:15.655927 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Feb 9 19:49:15.655932 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Feb 9 19:49:15.655937 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Feb 9 19:49:15.655942 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Feb 9 19:49:15.655948 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Feb 9 19:49:15.655953 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Feb 9 19:49:15.655959 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Feb 9 19:49:15.655964 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Feb 9 19:49:15.655969 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Feb 9 19:49:15.655974 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Feb 9 19:49:15.655979 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Feb 9 19:49:15.655984 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Feb 9 19:49:15.655989 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Feb 9 19:49:15.655994 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Feb 9 19:49:15.655999 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Feb 9 19:49:15.656005 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Feb 9 19:49:15.656010 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Feb 9 19:49:15.656015 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Feb 9 19:49:15.656020 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Feb 9 19:49:15.656025 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Feb 9 19:49:15.656030 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Feb 9 19:49:15.656035 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Feb 9 19:49:15.656040 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Feb 9 19:49:15.656046 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Feb 9 19:49:15.656051 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Feb 9 19:49:15.656057 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Feb 9 19:49:15.656062 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Feb 9 19:49:15.656067 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Feb 9 19:49:15.656072 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Feb 9 19:49:15.656077 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Feb 9 19:49:15.656082 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Feb 9 19:49:15.656087 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:49:15.656092 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 9 19:49:15.656098 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Feb 9 19:49:15.656104 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Feb 9 19:49:15.656109 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Feb 9 19:49:15.656114 kernel: Zone ranges: Feb 9 19:49:15.656120 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:49:15.656125 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Feb 9 19:49:15.656130 kernel: Normal empty Feb 9 19:49:15.656135 kernel: Movable zone start for each node Feb 9 19:49:15.656141 kernel: Early memory node ranges Feb 9 19:49:15.656146 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Feb 9 19:49:15.656151 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Feb 9 19:49:15.656157 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Feb 9 19:49:15.656162 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Feb 9 19:49:15.656167 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:49:15.656173 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Feb 9 19:49:15.656178 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Feb 9 19:49:15.656183 kernel: ACPI: PM-Timer IO Port: 0x1008 Feb 9 19:49:15.656188 kernel: system APIC only can use physical flat Feb 9 19:49:15.656193 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Feb 9 19:49:15.656199 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 19:49:15.656205 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 19:49:15.656210 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 19:49:15.656215 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 19:49:15.656220 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 19:49:15.656225 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 19:49:15.656230 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 19:49:15.656235 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 19:49:15.656241 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 19:49:15.656246 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 19:49:15.656251 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 19:49:15.656257 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 19:49:15.656262 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 19:49:15.656267 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 19:49:15.656272 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 19:49:15.656277 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 19:49:15.656282 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Feb 9 19:49:15.656288 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Feb 9 19:49:15.656293 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Feb 9 19:49:15.656298 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Feb 9 19:49:15.656304 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Feb 9 19:49:15.656309 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Feb 9 19:49:15.656314 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Feb 9 19:49:15.656319 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Feb 9 19:49:15.656325 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Feb 9 19:49:15.656330 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Feb 9 19:49:15.656335 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Feb 9 19:49:15.656340 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Feb 9 19:49:15.656345 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Feb 9 19:49:15.656351 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Feb 9 19:49:15.656357 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Feb 9 19:49:15.656362 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Feb 9 19:49:15.656367 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Feb 9 19:49:15.656372 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Feb 9 19:49:15.656377 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Feb 9 19:49:15.656382 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Feb 9 19:49:15.656388 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Feb 9 19:49:15.656393 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Feb 9 19:49:15.656398 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Feb 9 19:49:15.656404 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Feb 9 19:49:15.656409 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Feb 9 19:49:15.656414 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Feb 9 19:49:15.656420 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Feb 9 19:49:15.656425 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Feb 9 19:49:15.656430 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Feb 9 19:49:15.656435 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Feb 9 19:49:15.656440 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Feb 9 19:49:15.656446 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Feb 9 19:49:15.656451 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Feb 9 19:49:15.656457 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Feb 9 19:49:15.656462 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Feb 9 19:49:15.656467 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Feb 9 19:49:15.656472 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Feb 9 19:49:15.656477 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Feb 9 19:49:15.656482 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Feb 9 19:49:15.656488 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Feb 9 19:49:15.656531 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Feb 9 19:49:15.656538 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Feb 9 19:49:15.656545 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Feb 9 19:49:15.656550 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Feb 9 19:49:15.656555 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Feb 9 19:49:15.656560 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Feb 9 19:49:15.656565 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Feb 9 19:49:15.656571 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Feb 9 19:49:15.656576 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Feb 9 19:49:15.656581 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Feb 9 19:49:15.656586 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Feb 9 19:49:15.656591 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Feb 9 19:49:15.656597 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Feb 9 19:49:15.656603 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Feb 9 19:49:15.656608 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Feb 9 19:49:15.656613 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Feb 9 19:49:15.656618 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Feb 9 19:49:15.656623 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Feb 9 19:49:15.656629 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Feb 9 19:49:15.656634 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Feb 9 19:49:15.656639 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Feb 9 19:49:15.656645 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Feb 9 19:49:15.656650 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Feb 9 19:49:15.656655 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Feb 9 19:49:15.656660 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Feb 9 19:49:15.656666 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Feb 9 19:49:15.656671 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Feb 9 19:49:15.656676 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Feb 9 19:49:15.656681 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Feb 9 19:49:15.656686 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Feb 9 19:49:15.656692 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Feb 9 19:49:15.656699 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Feb 9 19:49:15.656704 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Feb 9 19:49:15.656709 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Feb 9 19:49:15.656715 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Feb 9 19:49:15.656720 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Feb 9 19:49:15.656725 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Feb 9 19:49:15.656730 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Feb 9 19:49:15.656735 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Feb 9 19:49:15.656740 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Feb 9 19:49:15.656746 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Feb 9 19:49:15.656752 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Feb 9 19:49:15.656757 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Feb 9 19:49:15.656762 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Feb 9 19:49:15.656767 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Feb 9 19:49:15.656772 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Feb 9 19:49:15.656777 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Feb 9 19:49:15.656783 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Feb 9 19:49:15.656788 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Feb 9 19:49:15.656794 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Feb 9 19:49:15.656799 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Feb 9 19:49:15.656804 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Feb 9 19:49:15.656809 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Feb 9 19:49:15.656816 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Feb 9 19:49:15.656824 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Feb 9 19:49:15.656834 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Feb 9 19:49:15.656842 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Feb 9 19:49:15.656848 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Feb 9 19:49:15.656854 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Feb 9 19:49:15.656860 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Feb 9 19:49:15.656865 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Feb 9 19:49:15.656870 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Feb 9 19:49:15.656876 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Feb 9 19:49:15.656881 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Feb 9 19:49:15.656886 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Feb 9 19:49:15.656891 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Feb 9 19:49:15.656896 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Feb 9 19:49:15.656901 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Feb 9 19:49:15.656908 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Feb 9 19:49:15.656913 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Feb 9 19:49:15.656918 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Feb 9 19:49:15.656923 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:49:15.656929 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Feb 9 19:49:15.656934 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:49:15.656939 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Feb 9 19:49:15.656944 kernel: TSC deadline timer available Feb 9 19:49:15.656950 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Feb 9 19:49:15.656956 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Feb 9 19:49:15.656961 kernel: Booting paravirtualized kernel on VMware hypervisor Feb 9 19:49:15.656966 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:49:15.656972 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Feb 9 19:49:15.656977 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 19:49:15.656983 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 19:49:15.656988 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Feb 9 19:49:15.656993 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Feb 9 19:49:15.656998 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Feb 9 19:49:15.657004 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Feb 9 19:49:15.657009 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Feb 9 19:49:15.657014 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Feb 9 19:49:15.657019 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Feb 9 19:49:15.657031 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Feb 9 19:49:15.657037 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Feb 9 19:49:15.657043 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Feb 9 19:49:15.657048 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Feb 9 19:49:15.657053 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Feb 9 19:49:15.657059 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Feb 9 19:49:15.657065 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Feb 9 19:49:15.657070 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Feb 9 19:49:15.657076 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Feb 9 19:49:15.657081 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Feb 9 19:49:15.657087 kernel: Policy zone: DMA32 Feb 9 19:49:15.657093 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:49:15.657099 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:49:15.657105 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Feb 9 19:49:15.657110 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Feb 9 19:49:15.657116 kernel: printk: log_buf_len min size: 262144 bytes Feb 9 19:49:15.657122 kernel: printk: log_buf_len: 1048576 bytes Feb 9 19:49:15.657127 kernel: printk: early log buf free: 239728(91%) Feb 9 19:49:15.657134 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:49:15.657139 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:49:15.657145 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:49:15.657151 kernel: Memory: 1942952K/2096628K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 153416K reserved, 0K cma-reserved) Feb 9 19:49:15.657158 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Feb 9 19:49:15.657164 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:49:15.657169 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:49:15.657176 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:49:15.657182 kernel: rcu: RCU event tracing is enabled. Feb 9 19:49:15.657187 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Feb 9 19:49:15.657194 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:49:15.657200 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:49:15.657205 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:49:15.657211 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Feb 9 19:49:15.657216 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Feb 9 19:49:15.657222 kernel: random: crng init done Feb 9 19:49:15.657227 kernel: Console: colour VGA+ 80x25 Feb 9 19:49:15.657233 kernel: printk: console [tty0] enabled Feb 9 19:49:15.657238 kernel: printk: console [ttyS0] enabled Feb 9 19:49:15.657245 kernel: ACPI: Core revision 20210730 Feb 9 19:49:15.657251 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Feb 9 19:49:15.657256 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:49:15.657262 kernel: x2apic enabled Feb 9 19:49:15.657267 kernel: Switched APIC routing to physical x2apic. Feb 9 19:49:15.657273 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 19:49:15.657279 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 9 19:49:15.657284 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Feb 9 19:49:15.657290 kernel: Disabled fast string operations Feb 9 19:49:15.657296 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 19:49:15.657302 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 19:49:15.657308 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:49:15.657313 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 19:49:15.657319 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 19:49:15.657325 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:49:15.657330 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 19:49:15.657336 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 19:49:15.657342 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:49:15.657348 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:49:15.657354 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:49:15.657360 kernel: SRBDS: Unknown: Dependent on hypervisor status Feb 9 19:49:15.657365 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 19:49:15.657371 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:49:15.657377 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:49:15.657382 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:49:15.657388 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:49:15.657393 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 9 19:49:15.657400 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:49:15.657405 kernel: pid_max: default: 131072 minimum: 1024 Feb 9 19:49:15.657411 kernel: LSM: Security Framework initializing Feb 9 19:49:15.657417 kernel: SELinux: Initializing. Feb 9 19:49:15.657422 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:49:15.657428 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:49:15.657434 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 19:49:15.657439 kernel: Performance Events: Skylake events, core PMU driver. Feb 9 19:49:15.657446 kernel: core: CPUID marked event: 'cpu cycles' unavailable Feb 9 19:49:15.657451 kernel: core: CPUID marked event: 'instructions' unavailable Feb 9 19:49:15.657457 kernel: core: CPUID marked event: 'bus cycles' unavailable Feb 9 19:49:15.657463 kernel: core: CPUID marked event: 'cache references' unavailable Feb 9 19:49:15.657468 kernel: core: CPUID marked event: 'cache misses' unavailable Feb 9 19:49:15.657474 kernel: core: CPUID marked event: 'branch instructions' unavailable Feb 9 19:49:15.663512 kernel: core: CPUID marked event: 'branch misses' unavailable Feb 9 19:49:15.663521 kernel: ... version: 1 Feb 9 19:49:15.663528 kernel: ... bit width: 48 Feb 9 19:49:15.663536 kernel: ... generic registers: 4 Feb 9 19:49:15.663542 kernel: ... value mask: 0000ffffffffffff Feb 9 19:49:15.663547 kernel: ... max period: 000000007fffffff Feb 9 19:49:15.663553 kernel: ... fixed-purpose events: 0 Feb 9 19:49:15.663560 kernel: ... event mask: 000000000000000f Feb 9 19:49:15.663565 kernel: signal: max sigframe size: 1776 Feb 9 19:49:15.663571 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:49:15.663577 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:49:15.663583 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:49:15.663590 kernel: x86: Booting SMP configuration: Feb 9 19:49:15.663596 kernel: .... node #0, CPUs: #1 Feb 9 19:49:15.663601 kernel: Disabled fast string operations Feb 9 19:49:15.663607 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Feb 9 19:49:15.663613 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Feb 9 19:49:15.663618 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:49:15.663624 kernel: smpboot: Max logical packages: 128 Feb 9 19:49:15.663630 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Feb 9 19:49:15.663635 kernel: devtmpfs: initialized Feb 9 19:49:15.663641 kernel: x86/mm: Memory block size: 128MB Feb 9 19:49:15.663648 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Feb 9 19:49:15.663653 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:49:15.663659 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Feb 9 19:49:15.663665 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:49:15.663671 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:49:15.663676 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:49:15.663682 kernel: audit: type=2000 audit(1707508154.057:1): state=initialized audit_enabled=0 res=1 Feb 9 19:49:15.663688 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:49:15.663694 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:49:15.663701 kernel: cpuidle: using governor menu Feb 9 19:49:15.663706 kernel: Simple Boot Flag at 0x36 set to 0x80 Feb 9 19:49:15.663712 kernel: ACPI: bus type PCI registered Feb 9 19:49:15.663717 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:49:15.663723 kernel: dca service started, version 1.12.1 Feb 9 19:49:15.663729 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Feb 9 19:49:15.663735 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Feb 9 19:49:15.663740 kernel: PCI: Using configuration type 1 for base access Feb 9 19:49:15.663746 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:49:15.663753 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:49:15.663758 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:49:15.663764 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:49:15.663769 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:49:15.663775 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:49:15.663781 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:49:15.663786 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:49:15.663792 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:49:15.663797 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:49:15.663805 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:49:15.663810 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 19:49:15.663816 kernel: ACPI: Interpreter enabled Feb 9 19:49:15.663822 kernel: ACPI: PM: (supports S0 S1 S5) Feb 9 19:49:15.663827 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:49:15.663833 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:49:15.663839 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Feb 9 19:49:15.663844 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Feb 9 19:49:15.663928 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:49:15.663982 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Feb 9 19:49:15.664038 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Feb 9 19:49:15.664047 kernel: PCI host bridge to bus 0000:00 Feb 9 19:49:15.664096 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:49:15.664137 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Feb 9 19:49:15.664177 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Feb 9 19:49:15.664219 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Feb 9 19:49:15.664258 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Feb 9 19:49:15.664300 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 9 19:49:15.664339 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:49:15.664378 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Feb 9 19:49:15.664417 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Feb 9 19:49:15.664469 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Feb 9 19:49:15.664529 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Feb 9 19:49:15.664584 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Feb 9 19:49:15.664641 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Feb 9 19:49:15.664703 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Feb 9 19:49:15.664765 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 19:49:15.664825 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 19:49:15.664893 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 19:49:15.664958 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 19:49:15.665031 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Feb 9 19:49:15.665100 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Feb 9 19:49:15.665156 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Feb 9 19:49:15.665225 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Feb 9 19:49:15.665285 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Feb 9 19:49:15.665360 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Feb 9 19:49:15.665425 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Feb 9 19:49:15.665473 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Feb 9 19:49:15.668568 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Feb 9 19:49:15.668623 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Feb 9 19:49:15.668672 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Feb 9 19:49:15.668719 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:49:15.668773 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Feb 9 19:49:15.668826 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.668873 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.668922 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.668969 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669018 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669066 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669116 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669162 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669213 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669259 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669311 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669359 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669409 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669455 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669517 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669567 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669618 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669667 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669716 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669762 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669812 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669858 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.669907 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.669955 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670005 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670050 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670100 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670145 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670198 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670246 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670296 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670347 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670397 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670443 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670500 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670551 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670600 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670646 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670695 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670750 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670799 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670861 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.670912 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.670958 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671009 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671056 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671106 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671152 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671205 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671251 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671300 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671346 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671396 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671449 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671521 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671568 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671617 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671662 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671710 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671756 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671808 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671854 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671903 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Feb 9 19:49:15.671949 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.671997 kernel: pci_bus 0000:01: extended config space not accessible Feb 9 19:49:15.672043 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 19:49:15.672092 kernel: pci_bus 0000:02: extended config space not accessible Feb 9 19:49:15.672100 kernel: acpiphp: Slot [32] registered Feb 9 19:49:15.672107 kernel: acpiphp: Slot [33] registered Feb 9 19:49:15.672112 kernel: acpiphp: Slot [34] registered Feb 9 19:49:15.672118 kernel: acpiphp: Slot [35] registered Feb 9 19:49:15.672124 kernel: acpiphp: Slot [36] registered Feb 9 19:49:15.672129 kernel: acpiphp: Slot [37] registered Feb 9 19:49:15.672135 kernel: acpiphp: Slot [38] registered Feb 9 19:49:15.672141 kernel: acpiphp: Slot [39] registered Feb 9 19:49:15.672147 kernel: acpiphp: Slot [40] registered Feb 9 19:49:15.672153 kernel: acpiphp: Slot [41] registered Feb 9 19:49:15.672159 kernel: acpiphp: Slot [42] registered Feb 9 19:49:15.672164 kernel: acpiphp: Slot [43] registered Feb 9 19:49:15.672170 kernel: acpiphp: Slot [44] registered Feb 9 19:49:15.672175 kernel: acpiphp: Slot [45] registered Feb 9 19:49:15.672181 kernel: acpiphp: Slot [46] registered Feb 9 19:49:15.672186 kernel: acpiphp: Slot [47] registered Feb 9 19:49:15.672192 kernel: acpiphp: Slot [48] registered Feb 9 19:49:15.672198 kernel: acpiphp: Slot [49] registered Feb 9 19:49:15.672204 kernel: acpiphp: Slot [50] registered Feb 9 19:49:15.672210 kernel: acpiphp: Slot [51] registered Feb 9 19:49:15.672215 kernel: acpiphp: Slot [52] registered Feb 9 19:49:15.672221 kernel: acpiphp: Slot [53] registered Feb 9 19:49:15.672226 kernel: acpiphp: Slot [54] registered Feb 9 19:49:15.672232 kernel: acpiphp: Slot [55] registered Feb 9 19:49:15.672237 kernel: acpiphp: Slot [56] registered Feb 9 19:49:15.672243 kernel: acpiphp: Slot [57] registered Feb 9 19:49:15.672248 kernel: acpiphp: Slot [58] registered Feb 9 19:49:15.672256 kernel: acpiphp: Slot [59] registered Feb 9 19:49:15.672261 kernel: acpiphp: Slot [60] registered Feb 9 19:49:15.672267 kernel: acpiphp: Slot [61] registered Feb 9 19:49:15.672272 kernel: acpiphp: Slot [62] registered Feb 9 19:49:15.672278 kernel: acpiphp: Slot [63] registered Feb 9 19:49:15.672324 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Feb 9 19:49:15.672370 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 9 19:49:15.672415 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 9 19:49:15.672460 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 9 19:49:15.672514 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Feb 9 19:49:15.672561 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Feb 9 19:49:15.672605 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Feb 9 19:49:15.672650 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Feb 9 19:49:15.672694 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Feb 9 19:49:15.672739 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Feb 9 19:49:15.672784 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Feb 9 19:49:15.672831 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Feb 9 19:49:15.672882 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Feb 9 19:49:15.672929 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Feb 9 19:49:15.672975 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Feb 9 19:49:15.673021 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 9 19:49:15.673067 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 19:49:15.673127 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 9 19:49:15.673178 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 9 19:49:15.673224 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 9 19:49:15.673269 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 9 19:49:15.673315 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 9 19:49:15.673360 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 9 19:49:15.673406 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 9 19:49:15.673450 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 9 19:49:15.673501 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 9 19:49:15.673550 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 9 19:49:15.673594 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 9 19:49:15.673638 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 9 19:49:15.673684 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 9 19:49:15.673733 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 9 19:49:15.673778 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 9 19:49:15.673826 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 9 19:49:15.673870 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 9 19:49:15.673916 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 9 19:49:15.673961 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 9 19:49:15.674005 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 9 19:49:15.674050 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 9 19:49:15.674098 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 9 19:49:15.674142 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 9 19:49:15.674186 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 9 19:49:15.674247 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 9 19:49:15.674295 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 9 19:49:15.674341 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 9 19:49:15.690061 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Feb 9 19:49:15.690126 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Feb 9 19:49:15.690180 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Feb 9 19:49:15.690228 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Feb 9 19:49:15.690275 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Feb 9 19:49:15.690323 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 9 19:49:15.690371 kernel: pci 0000:0b:00.0: supports D1 D2 Feb 9 19:49:15.690419 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 19:49:15.690466 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 9 19:49:15.690528 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 9 19:49:15.690578 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 9 19:49:15.690623 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 9 19:49:15.690671 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 9 19:49:15.690717 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 9 19:49:15.690761 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 9 19:49:15.690806 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 9 19:49:15.690854 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 9 19:49:15.690902 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 9 19:49:15.690948 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 9 19:49:15.690993 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 9 19:49:15.691047 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 9 19:49:15.691106 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 9 19:49:15.691152 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 9 19:49:15.691199 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 9 19:49:15.691244 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 9 19:49:15.691291 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 9 19:49:15.691337 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 9 19:49:15.691382 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 9 19:49:15.691427 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 9 19:49:15.691473 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 9 19:49:15.691539 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 9 19:49:15.691587 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 9 19:49:15.691635 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 9 19:49:15.691682 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 9 19:49:15.691728 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 9 19:49:15.691775 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 9 19:49:15.691821 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 9 19:49:15.691879 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 9 19:49:15.691924 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 9 19:49:15.691972 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 9 19:49:15.692019 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 9 19:49:15.692064 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 9 19:49:15.692108 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 9 19:49:15.692155 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 9 19:49:15.692200 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 9 19:49:15.692244 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 9 19:49:15.692288 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 9 19:49:15.692334 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 9 19:49:15.692381 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 9 19:49:15.692426 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 9 19:49:15.692473 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 9 19:49:15.692538 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 9 19:49:15.692596 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 9 19:49:15.692642 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 9 19:49:15.692686 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 9 19:49:15.692742 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 9 19:49:15.692793 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 9 19:49:15.692839 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 9 19:49:15.692884 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 9 19:49:15.692931 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 9 19:49:15.692976 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 9 19:49:15.693021 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 9 19:49:15.693067 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 9 19:49:15.693113 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 9 19:49:15.693160 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 9 19:49:15.693205 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 9 19:49:15.693251 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 9 19:49:15.693297 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 9 19:49:15.693342 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 9 19:49:15.693386 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 9 19:49:15.693433 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 9 19:49:15.693481 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 9 19:49:15.693561 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 9 19:49:15.693609 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 9 19:49:15.693654 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 9 19:49:15.693698 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 9 19:49:15.693743 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 9 19:49:15.693802 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 9 19:49:15.693880 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 9 19:49:15.693928 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 9 19:49:15.693976 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 9 19:49:15.694021 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 9 19:49:15.694068 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 9 19:49:15.694113 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 9 19:49:15.694157 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 9 19:49:15.694203 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 9 19:49:15.694248 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 9 19:49:15.694293 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 9 19:49:15.694302 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Feb 9 19:49:15.694308 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Feb 9 19:49:15.694314 kernel: ACPI: PCI: Interrupt link LNKB disabled Feb 9 19:49:15.694320 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:49:15.694325 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Feb 9 19:49:15.694331 kernel: iommu: Default domain type: Translated Feb 9 19:49:15.694337 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:49:15.694394 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Feb 9 19:49:15.694445 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:49:15.694514 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Feb 9 19:49:15.694523 kernel: vgaarb: loaded Feb 9 19:49:15.694530 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:49:15.694536 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:49:15.694543 kernel: PTP clock support registered Feb 9 19:49:15.694552 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:49:15.694558 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:49:15.694564 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Feb 9 19:49:15.694572 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Feb 9 19:49:15.694577 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Feb 9 19:49:15.694583 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Feb 9 19:49:15.694589 kernel: clocksource: Switched to clocksource tsc-early Feb 9 19:49:15.694594 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:49:15.694600 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:49:15.694606 kernel: pnp: PnP ACPI init Feb 9 19:49:15.694657 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Feb 9 19:49:15.694706 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Feb 9 19:49:15.694751 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Feb 9 19:49:15.694800 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Feb 9 19:49:15.694844 kernel: pnp 00:06: [dma 2] Feb 9 19:49:15.694889 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Feb 9 19:49:15.694930 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Feb 9 19:49:15.694971 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Feb 9 19:49:15.694980 kernel: pnp: PnP ACPI: found 8 devices Feb 9 19:49:15.694986 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:49:15.694992 kernel: NET: Registered PF_INET protocol family Feb 9 19:49:15.694998 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:49:15.695004 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 19:49:15.695010 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:49:15.695016 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:49:15.695021 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 19:49:15.695027 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 19:49:15.695034 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:49:15.695048 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:49:15.695055 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:49:15.695060 kernel: NET: Registered PF_XDP protocol family Feb 9 19:49:15.695122 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Feb 9 19:49:15.695170 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Feb 9 19:49:15.695218 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Feb 9 19:49:15.695269 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Feb 9 19:49:15.695317 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Feb 9 19:49:15.695364 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Feb 9 19:49:15.695410 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Feb 9 19:49:15.695456 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Feb 9 19:49:15.695513 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Feb 9 19:49:15.695565 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Feb 9 19:49:15.695610 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Feb 9 19:49:15.695655 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Feb 9 19:49:15.695700 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Feb 9 19:49:15.695761 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Feb 9 19:49:15.695810 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Feb 9 19:49:15.695858 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Feb 9 19:49:15.695903 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Feb 9 19:49:15.695949 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Feb 9 19:49:15.695994 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Feb 9 19:49:15.696039 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Feb 9 19:49:15.696084 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Feb 9 19:49:15.696131 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Feb 9 19:49:15.696176 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Feb 9 19:49:15.696221 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Feb 9 19:49:15.696266 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Feb 9 19:49:15.696311 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696356 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696402 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696448 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696492 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696545 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696591 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696636 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696681 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696725 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696770 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696817 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696861 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696905 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.696949 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.696993 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697042 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697086 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697131 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697177 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697222 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697266 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697310 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697355 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697400 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697444 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697489 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697658 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697719 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697783 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697829 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697872 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.697916 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.697960 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698005 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698051 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698095 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698139 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698183 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698228 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698272 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698316 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698360 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698407 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698451 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698501 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698557 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698602 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698647 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698692 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698736 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698781 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698829 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698873 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.698917 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.698962 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699006 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699051 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699095 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699140 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699184 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699229 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699275 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699320 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699364 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699409 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699461 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699614 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699663 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699707 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699762 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699810 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699855 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699899 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.699944 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.699988 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.700033 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.700078 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.700122 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.700167 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.700504 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.700559 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.700606 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 9 19:49:15.700652 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 9 19:49:15.700968 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 19:49:15.701020 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Feb 9 19:49:15.701069 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 9 19:49:15.701114 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 9 19:49:15.701159 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 9 19:49:15.701210 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Feb 9 19:49:15.701256 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 9 19:49:15.701302 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 9 19:49:15.701347 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 9 19:49:15.701391 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Feb 9 19:49:15.701436 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 9 19:49:15.701481 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 9 19:49:15.701577 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 9 19:49:15.701624 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 9 19:49:15.701673 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 9 19:49:15.701718 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 9 19:49:15.701778 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 9 19:49:15.701825 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 9 19:49:15.701869 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 9 19:49:15.701929 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 9 19:49:15.701978 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 9 19:49:15.702025 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 9 19:49:15.702070 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 9 19:49:15.702114 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 9 19:49:15.702158 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 9 19:49:15.702202 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 9 19:49:15.702246 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 9 19:49:15.702290 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 9 19:49:15.702565 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 9 19:49:15.702614 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 9 19:49:15.702664 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 9 19:49:15.702710 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 9 19:49:15.702755 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 9 19:49:15.702804 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Feb 9 19:49:15.702850 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 9 19:49:15.702896 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 9 19:49:15.702941 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 9 19:49:15.702986 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Feb 9 19:49:15.703032 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 9 19:49:15.703079 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 9 19:49:15.703124 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 9 19:49:15.703168 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 9 19:49:15.703216 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 9 19:49:15.703278 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 9 19:49:15.703323 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 9 19:49:15.703367 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 9 19:49:15.703411 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 9 19:49:15.703455 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 9 19:49:15.703538 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 9 19:49:15.703588 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 9 19:49:15.703633 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 9 19:49:15.703677 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 9 19:49:15.703726 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 9 19:49:15.703771 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 9 19:49:15.703816 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 9 19:49:15.703860 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 9 19:49:15.703905 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 9 19:49:15.703949 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 9 19:49:15.703996 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 9 19:49:15.704040 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 9 19:49:15.704084 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 9 19:49:15.704128 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 9 19:49:15.704172 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 9 19:49:15.704215 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 9 19:49:15.704259 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 9 19:49:15.704304 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 9 19:49:15.704348 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 9 19:49:15.704394 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 9 19:49:15.704439 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 9 19:49:15.704484 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 9 19:49:15.704536 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 9 19:49:15.704581 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 9 19:49:15.704626 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 9 19:49:15.704671 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 9 19:49:15.704722 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 9 19:49:15.704791 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 9 19:49:15.705064 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 9 19:49:15.705119 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 9 19:49:15.705167 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 9 19:49:15.705213 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 9 19:49:15.705259 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 9 19:49:15.705305 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 9 19:49:15.705352 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 9 19:49:15.705396 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 9 19:49:15.705441 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 9 19:49:15.705486 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 9 19:49:15.705547 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 9 19:49:15.705593 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 9 19:49:15.705640 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 9 19:49:15.705685 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 9 19:49:15.705737 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 9 19:49:15.705782 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 9 19:49:15.705826 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 9 19:49:15.705889 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 9 19:49:15.705973 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 9 19:49:15.706021 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 9 19:49:15.706094 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 9 19:49:15.706167 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 9 19:49:15.706214 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 9 19:49:15.706259 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 9 19:49:15.706304 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 9 19:49:15.706349 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 9 19:49:15.706394 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 9 19:49:15.706439 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 9 19:49:15.706484 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 9 19:49:15.706547 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 9 19:49:15.706594 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 9 19:49:15.706639 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 9 19:49:15.706683 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 9 19:49:15.706728 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 9 19:49:15.706773 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 9 19:49:15.706837 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 9 19:49:15.707132 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 9 19:49:15.707192 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 9 19:49:15.707445 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Feb 9 19:49:15.707491 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Feb 9 19:49:15.707613 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 9 19:49:15.707930 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 9 19:49:15.707983 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 9 19:49:15.708026 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 9 19:49:15.708065 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Feb 9 19:49:15.708108 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Feb 9 19:49:15.708152 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Feb 9 19:49:15.708193 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Feb 9 19:49:15.708234 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 9 19:49:15.708274 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Feb 9 19:49:15.708315 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Feb 9 19:49:15.708355 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 9 19:49:15.708396 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 9 19:49:15.708439 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 9 19:49:15.708479 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 9 19:49:15.708533 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Feb 9 19:49:15.708577 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Feb 9 19:49:15.708623 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Feb 9 19:49:15.708664 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Feb 9 19:49:15.708706 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Feb 9 19:49:15.708859 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Feb 9 19:49:15.708905 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Feb 9 19:49:15.708963 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Feb 9 19:49:15.709010 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Feb 9 19:49:15.709051 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Feb 9 19:49:15.709092 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Feb 9 19:49:15.709140 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Feb 9 19:49:15.709184 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Feb 9 19:49:15.709245 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Feb 9 19:49:15.709288 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 9 19:49:15.709336 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Feb 9 19:49:15.709385 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Feb 9 19:49:15.709433 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Feb 9 19:49:15.709475 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Feb 9 19:49:15.709553 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Feb 9 19:49:15.709598 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Feb 9 19:49:15.709644 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Feb 9 19:49:15.709961 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Feb 9 19:49:15.710009 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Feb 9 19:49:15.710061 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Feb 9 19:49:15.710104 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Feb 9 19:49:15.710146 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Feb 9 19:49:15.710189 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Feb 9 19:49:15.710231 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Feb 9 19:49:15.710272 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Feb 9 19:49:15.710316 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Feb 9 19:49:15.710361 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 9 19:49:15.710406 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Feb 9 19:49:15.710447 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 9 19:49:15.710505 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Feb 9 19:49:15.710551 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Feb 9 19:49:15.710597 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Feb 9 19:49:15.710642 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Feb 9 19:49:15.710689 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Feb 9 19:49:15.710737 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 9 19:49:15.710782 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Feb 9 19:49:15.710824 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Feb 9 19:49:15.710865 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 9 19:49:15.710912 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Feb 9 19:49:15.710954 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Feb 9 19:49:15.710995 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Feb 9 19:49:15.711039 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Feb 9 19:49:15.711081 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Feb 9 19:49:15.711123 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Feb 9 19:49:15.711167 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Feb 9 19:49:15.711211 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 9 19:49:15.711257 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Feb 9 19:49:15.711299 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 9 19:49:15.711346 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Feb 9 19:49:15.711388 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Feb 9 19:49:15.711433 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Feb 9 19:49:15.711479 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Feb 9 19:49:15.711540 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Feb 9 19:49:15.711584 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 9 19:49:15.711628 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Feb 9 19:49:15.711670 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Feb 9 19:49:15.711725 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Feb 9 19:49:15.712117 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Feb 9 19:49:15.712170 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Feb 9 19:49:15.712214 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Feb 9 19:49:15.712261 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Feb 9 19:49:15.712304 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Feb 9 19:49:15.712350 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Feb 9 19:49:15.712394 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 9 19:49:15.712441 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Feb 9 19:49:15.712483 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Feb 9 19:49:15.712565 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Feb 9 19:49:15.712607 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Feb 9 19:49:15.712651 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Feb 9 19:49:15.712696 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Feb 9 19:49:15.712740 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Feb 9 19:49:15.712781 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 9 19:49:15.712831 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:49:15.712841 kernel: PCI: CLS 32 bytes, default 64 Feb 9 19:49:15.712847 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:49:15.712854 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 9 19:49:15.712860 kernel: clocksource: Switched to clocksource tsc Feb 9 19:49:15.712867 kernel: Initialise system trusted keyrings Feb 9 19:49:15.712873 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 19:49:15.712879 kernel: Key type asymmetric registered Feb 9 19:49:15.712885 kernel: Asymmetric key parser 'x509' registered Feb 9 19:49:15.712891 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:49:15.712897 kernel: io scheduler mq-deadline registered Feb 9 19:49:15.712903 kernel: io scheduler kyber registered Feb 9 19:49:15.712909 kernel: io scheduler bfq registered Feb 9 19:49:15.712957 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Feb 9 19:49:15.713006 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.713052 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Feb 9 19:49:15.713099 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.713145 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Feb 9 19:49:15.713191 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.713236 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Feb 9 19:49:15.713600 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.713655 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Feb 9 19:49:15.713707 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.713877 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Feb 9 19:49:15.713928 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.713975 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Feb 9 19:49:15.714304 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.714368 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Feb 9 19:49:15.714424 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.714475 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Feb 9 19:49:15.714550 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.714598 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Feb 9 19:49:15.714647 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.714693 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Feb 9 19:49:15.714746 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.714969 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Feb 9 19:49:15.715223 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715275 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Feb 9 19:49:15.715326 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715372 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Feb 9 19:49:15.715418 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715463 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Feb 9 19:49:15.715535 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715584 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Feb 9 19:49:15.715632 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715679 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Feb 9 19:49:15.715725 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715771 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Feb 9 19:49:15.715816 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715861 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Feb 9 19:49:15.715908 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.715953 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Feb 9 19:49:15.715998 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716043 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Feb 9 19:49:15.716088 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716132 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Feb 9 19:49:15.716180 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716238 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Feb 9 19:49:15.716293 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716339 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Feb 9 19:49:15.716385 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716433 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Feb 9 19:49:15.716478 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716531 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Feb 9 19:49:15.716577 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.716901 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Feb 9 19:49:15.716956 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.717005 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Feb 9 19:49:15.717053 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.717099 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Feb 9 19:49:15.717145 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.717192 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Feb 9 19:49:15.717237 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.717284 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Feb 9 19:49:15.717330 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.717376 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Feb 9 19:49:15.717558 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 9 19:49:15.717569 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:49:15.717578 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:49:15.717585 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:49:15.717592 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Feb 9 19:49:15.717599 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:49:15.717605 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:49:15.717654 kernel: rtc_cmos 00:01: registered as rtc0 Feb 9 19:49:15.717975 kernel: rtc_cmos 00:01: setting system clock to 2024-02-09T19:49:15 UTC (1707508155) Feb 9 19:49:15.718020 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Feb 9 19:49:15.718030 kernel: fail to initialize ptp_kvm Feb 9 19:49:15.718037 kernel: intel_pstate: CPU model not supported Feb 9 19:49:15.718043 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:49:15.718049 kernel: Segment Routing with IPv6 Feb 9 19:49:15.718055 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:49:15.718062 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:49:15.718068 kernel: Key type dns_resolver registered Feb 9 19:49:15.718074 kernel: IPI shorthand broadcast: enabled Feb 9 19:49:15.718080 kernel: sched_clock: Marking stable (838337973, 221803401)->(1126303236, -66161862) Feb 9 19:49:15.718087 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:49:15.718094 kernel: registered taskstats version 1 Feb 9 19:49:15.718100 kernel: Loading compiled-in X.509 certificates Feb 9 19:49:15.718106 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:49:15.718112 kernel: Key type .fscrypt registered Feb 9 19:49:15.718118 kernel: Key type fscrypt-provisioning registered Feb 9 19:49:15.718124 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:49:15.718130 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:49:15.718137 kernel: ima: No architecture policies found Feb 9 19:49:15.718144 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:49:15.718150 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:49:15.718156 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:49:15.718162 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:49:15.718168 kernel: Run /init as init process Feb 9 19:49:15.718174 kernel: with arguments: Feb 9 19:49:15.718180 kernel: /init Feb 9 19:49:15.718186 kernel: with environment: Feb 9 19:49:15.718192 kernel: HOME=/ Feb 9 19:49:15.718200 kernel: TERM=linux Feb 9 19:49:15.718211 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:49:15.718221 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:49:15.718232 systemd[1]: Detected virtualization vmware. Feb 9 19:49:15.718239 systemd[1]: Detected architecture x86-64. Feb 9 19:49:15.718245 systemd[1]: Running in initrd. Feb 9 19:49:15.718251 systemd[1]: No hostname configured, using default hostname. Feb 9 19:49:15.718257 systemd[1]: Hostname set to . Feb 9 19:49:15.718265 systemd[1]: Initializing machine ID from random generator. Feb 9 19:49:15.718271 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:49:15.718277 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:49:15.718283 systemd[1]: Reached target cryptsetup.target. Feb 9 19:49:15.718289 systemd[1]: Reached target paths.target. Feb 9 19:49:15.718296 systemd[1]: Reached target slices.target. Feb 9 19:49:15.718303 systemd[1]: Reached target swap.target. Feb 9 19:49:15.718309 systemd[1]: Reached target timers.target. Feb 9 19:49:15.718317 systemd[1]: Listening on iscsid.socket. Feb 9 19:49:15.718323 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:49:15.718330 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:49:15.718336 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:49:15.718342 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:49:15.718348 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:49:15.718355 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:49:15.718361 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:49:15.718368 systemd[1]: Reached target sockets.target. Feb 9 19:49:15.718375 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:49:15.718381 systemd[1]: Finished network-cleanup.service. Feb 9 19:49:15.718387 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:49:15.718394 systemd[1]: Starting systemd-journald.service... Feb 9 19:49:15.718400 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:49:15.718407 systemd[1]: Starting systemd-resolved.service... Feb 9 19:49:15.718413 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:49:15.718419 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:49:15.718426 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:49:15.718432 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:49:15.718439 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:49:15.718445 kernel: audit: type=1130 audit(1707508155.656:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.718452 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:49:15.718458 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:49:15.718464 kernel: audit: type=1130 audit(1707508155.659:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.718470 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:49:15.718478 kernel: audit: type=1130 audit(1707508155.674:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.718484 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:49:15.718490 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:49:15.718516 systemd[1]: Started systemd-resolved.service. Feb 9 19:49:15.718522 systemd[1]: Reached target nss-lookup.target. Feb 9 19:49:15.718529 kernel: audit: type=1130 audit(1707508155.685:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.718537 kernel: Bridge firewalling registered Feb 9 19:49:15.718543 kernel: SCSI subsystem initialized Feb 9 19:49:15.718549 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:49:15.718555 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:49:15.718561 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:49:15.718570 systemd-journald[217]: Journal started Feb 9 19:49:15.718602 systemd-journald[217]: Runtime Journal (/run/log/journal/cd779d38b2134e70a341c76c2987993c) is 4.8M, max 38.8M, 34.0M free. Feb 9 19:49:15.721952 systemd[1]: Started systemd-journald.service. Feb 9 19:49:15.721971 kernel: audit: type=1130 audit(1707508155.717:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.647182 systemd-modules-load[218]: Inserted module 'overlay' Feb 9 19:49:15.676772 systemd-resolved[219]: Positive Trust Anchors: Feb 9 19:49:15.676778 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:49:15.676797 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:49:15.684764 systemd-resolved[219]: Defaulting to hostname 'linux'. Feb 9 19:49:15.694380 systemd-modules-load[218]: Inserted module 'br_netfilter' Feb 9 19:49:15.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.728965 kernel: audit: type=1130 audit(1707508155.723:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.724900 systemd-modules-load[218]: Inserted module 'dm_multipath' Feb 9 19:49:15.729140 dracut-cmdline[233]: dracut-dracut-053 Feb 9 19:49:15.729140 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 19:49:15.729140 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:49:15.725222 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:49:15.727886 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:49:15.732095 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:49:15.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.735555 kernel: audit: type=1130 audit(1707508155.731:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.745734 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:49:15.751504 kernel: iscsi: registered transport (tcp) Feb 9 19:49:15.764510 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:49:15.764543 kernel: QLogic iSCSI HBA Driver Feb 9 19:49:15.780423 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:49:15.781031 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:49:15.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.784508 kernel: audit: type=1130 audit(1707508155.779:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:15.818510 kernel: raid6: avx2x4 gen() 48278 MB/s Feb 9 19:49:15.834506 kernel: raid6: avx2x4 xor() 22220 MB/s Feb 9 19:49:15.851512 kernel: raid6: avx2x2 gen() 53298 MB/s Feb 9 19:49:15.868504 kernel: raid6: avx2x2 xor() 31683 MB/s Feb 9 19:49:15.885503 kernel: raid6: avx2x1 gen() 44753 MB/s Feb 9 19:49:15.902505 kernel: raid6: avx2x1 xor() 27581 MB/s Feb 9 19:49:15.919503 kernel: raid6: sse2x4 gen() 21177 MB/s Feb 9 19:49:15.936508 kernel: raid6: sse2x4 xor() 11791 MB/s Feb 9 19:49:15.953539 kernel: raid6: sse2x2 gen() 21145 MB/s Feb 9 19:49:15.970510 kernel: raid6: sse2x2 xor() 12832 MB/s Feb 9 19:49:15.987503 kernel: raid6: sse2x1 gen() 18105 MB/s Feb 9 19:49:16.004702 kernel: raid6: sse2x1 xor() 8806 MB/s Feb 9 19:49:16.004734 kernel: raid6: using algorithm avx2x2 gen() 53298 MB/s Feb 9 19:49:16.004743 kernel: raid6: .... xor() 31683 MB/s, rmw enabled Feb 9 19:49:16.005880 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:49:16.014506 kernel: xor: automatically using best checksumming function avx Feb 9 19:49:16.075985 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:49:16.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:16.080174 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:49:16.079000 audit: BPF prog-id=7 op=LOAD Feb 9 19:49:16.079000 audit: BPF prog-id=8 op=LOAD Feb 9 19:49:16.083525 kernel: audit: type=1130 audit(1707508156.078:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:16.080809 systemd[1]: Starting systemd-udevd.service... Feb 9 19:49:16.090926 systemd-udevd[416]: Using default interface naming scheme 'v252'. Feb 9 19:49:16.093707 systemd[1]: Started systemd-udevd.service. Feb 9 19:49:16.094228 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:49:16.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:16.101520 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Feb 9 19:49:16.118043 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:49:16.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:16.118580 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:49:16.178516 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:49:16.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:16.235527 kernel: VMware PVSCSI driver - version 1.0.7.0-k Feb 9 19:49:16.241020 kernel: vmw_pvscsi: using 64bit dma Feb 9 19:49:16.241046 kernel: vmw_pvscsi: max_id: 16 Feb 9 19:49:16.241059 kernel: vmw_pvscsi: setting ring_pages to 8 Feb 9 19:49:16.245504 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Feb 9 19:49:16.253507 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Feb 9 19:49:16.256507 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:49:16.260681 kernel: vmw_pvscsi: enabling reqCallThreshold Feb 9 19:49:16.260706 kernel: vmw_pvscsi: driver-based request coalescing enabled Feb 9 19:49:16.260716 kernel: vmw_pvscsi: using MSI-X Feb 9 19:49:16.262507 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Feb 9 19:49:16.262599 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Feb 9 19:49:16.270548 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:49:16.270578 kernel: AES CTR mode by8 optimization enabled Feb 9 19:49:16.270592 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Feb 9 19:49:16.270676 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Feb 9 19:49:16.271504 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Feb 9 19:49:16.273505 kernel: libata version 3.00 loaded. Feb 9 19:49:16.276535 kernel: ata_piix 0000:00:07.1: version 2.13 Feb 9 19:49:16.276655 kernel: scsi host1: ata_piix Feb 9 19:49:16.276750 kernel: scsi host2: ata_piix Feb 9 19:49:16.276808 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Feb 9 19:49:16.276817 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Feb 9 19:49:16.446576 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Feb 9 19:49:16.450514 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Feb 9 19:49:16.460038 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Feb 9 19:49:16.460132 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 19:49:16.460195 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Feb 9 19:49:16.460253 kernel: sd 0:0:0:0: [sda] Cache data unavailable Feb 9 19:49:16.460308 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Feb 9 19:49:16.470536 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:49:16.470557 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 19:49:16.491012 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Feb 9 19:49:16.491121 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:49:16.497935 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:49:16.498546 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (476) Feb 9 19:49:16.502709 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:49:16.504238 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:49:16.504390 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:49:16.505152 systemd[1]: Starting disk-uuid.service... Feb 9 19:49:16.506505 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Feb 9 19:49:16.507629 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:49:16.528505 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:49:16.532504 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:49:17.539323 disk-uuid[548]: The operation has completed successfully. Feb 9 19:49:17.539599 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:49:17.577782 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:49:17.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:17.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:17.577834 systemd[1]: Finished disk-uuid.service. Feb 9 19:49:17.578440 systemd[1]: Starting verity-setup.service... Feb 9 19:49:17.588511 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:49:17.631302 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:49:17.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:17.632389 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:49:17.632616 systemd[1]: Finished verity-setup.service. Feb 9 19:49:17.685404 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:49:17.685566 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:49:17.686244 systemd[1]: Starting afterburn-network-kargs.service... Feb 9 19:49:17.686909 systemd[1]: Starting ignition-setup.service... Feb 9 19:49:17.702508 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:49:17.702542 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:49:17.702551 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:49:17.708514 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:49:17.724411 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:49:18.056879 systemd[1]: Finished ignition-setup.service. Feb 9 19:49:18.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.057467 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:49:18.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.090470 systemd[1]: Finished afterburn-network-kargs.service. Feb 9 19:49:18.091066 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:49:18.132484 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:49:18.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.131000 audit: BPF prog-id=9 op=LOAD Feb 9 19:49:18.133344 systemd[1]: Starting systemd-networkd.service... Feb 9 19:49:18.148168 systemd-networkd[730]: lo: Link UP Feb 9 19:49:18.148764 systemd-networkd[730]: lo: Gained carrier Feb 9 19:49:18.149183 systemd-networkd[730]: Enumeration completed Feb 9 19:49:18.149375 systemd[1]: Started systemd-networkd.service. Feb 9 19:49:18.149545 systemd[1]: Reached target network.target. Feb 9 19:49:18.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.149974 systemd-networkd[730]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Feb 9 19:49:18.154232 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 9 19:49:18.154377 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 9 19:49:18.150578 systemd[1]: Starting iscsiuio.service... Feb 9 19:49:18.155027 systemd[1]: Started iscsiuio.service. Feb 9 19:49:18.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.155884 systemd[1]: Starting iscsid.service... Feb 9 19:49:18.156445 systemd-networkd[730]: ens192: Link UP Feb 9 19:49:18.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.159340 iscsid[741]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:49:18.159340 iscsid[741]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:49:18.159340 iscsid[741]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:49:18.159340 iscsid[741]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:49:18.159340 iscsid[741]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:49:18.159340 iscsid[741]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:49:18.159340 iscsid[741]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:49:18.156447 systemd-networkd[730]: ens192: Gained carrier Feb 9 19:49:18.159080 systemd[1]: Started iscsid.service. Feb 9 19:49:18.159849 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:49:18.167040 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:49:18.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.167362 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:49:18.167586 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:49:18.167878 systemd[1]: Reached target remote-fs.target. Feb 9 19:49:18.168522 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:49:18.173742 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:49:18.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.234167 ignition[607]: Ignition 2.14.0 Feb 9 19:49:18.234439 ignition[607]: Stage: fetch-offline Feb 9 19:49:18.234599 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:49:18.234763 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 9 19:49:18.237846 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 9 19:49:18.238100 ignition[607]: parsed url from cmdline: "" Feb 9 19:49:18.238144 ignition[607]: no config URL provided Feb 9 19:49:18.238260 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:49:18.238398 ignition[607]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:49:18.238898 ignition[607]: config successfully fetched Feb 9 19:49:18.238959 ignition[607]: parsing config with SHA512: f9f2583079b0bdc40c882ba11736caae71e2883dd58ddf53dc13d6e5197bd3a5ae4582ceaba43e4a4ba3b8d230b7c76820a0fa239dba9ea2aa6dd93e1c3bae17 Feb 9 19:49:18.276291 unknown[607]: fetched base config from "system" Feb 9 19:49:18.276505 unknown[607]: fetched user config from "vmware" Feb 9 19:49:18.277083 ignition[607]: fetch-offline: fetch-offline passed Feb 9 19:49:18.277247 ignition[607]: Ignition finished successfully Feb 9 19:49:18.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.277882 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:49:18.278024 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 19:49:18.278465 systemd[1]: Starting ignition-kargs.service... Feb 9 19:49:18.283559 ignition[755]: Ignition 2.14.0 Feb 9 19:49:18.283570 ignition[755]: Stage: kargs Feb 9 19:49:18.283635 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:49:18.283645 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 9 19:49:18.284936 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 9 19:49:18.286699 ignition[755]: kargs: kargs passed Feb 9 19:49:18.286737 ignition[755]: Ignition finished successfully Feb 9 19:49:18.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.287726 systemd[1]: Finished ignition-kargs.service. Feb 9 19:49:18.288318 systemd[1]: Starting ignition-disks.service... Feb 9 19:49:18.292803 ignition[761]: Ignition 2.14.0 Feb 9 19:49:18.292811 ignition[761]: Stage: disks Feb 9 19:49:18.292875 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:49:18.292884 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 9 19:49:18.294128 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 9 19:49:18.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.296183 systemd[1]: Finished ignition-disks.service. Feb 9 19:49:18.295718 ignition[761]: disks: disks passed Feb 9 19:49:18.296352 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:49:18.295754 ignition[761]: Ignition finished successfully Feb 9 19:49:18.296447 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:49:18.296542 systemd[1]: Reached target local-fs.target. Feb 9 19:49:18.296641 systemd[1]: Reached target sysinit.target. Feb 9 19:49:18.296802 systemd[1]: Reached target basic.target. Feb 9 19:49:18.297413 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:49:18.308623 systemd-fsck[769]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:49:18.310288 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:49:18.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.310873 systemd[1]: Mounting sysroot.mount... Feb 9 19:49:18.317351 systemd[1]: Mounted sysroot.mount. Feb 9 19:49:18.317564 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:49:18.317488 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:49:18.318395 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:49:18.318743 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:49:18.318769 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:49:18.318784 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:49:18.320519 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:49:18.320970 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:49:18.323654 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:49:18.326904 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:49:18.329078 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:49:18.331207 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:49:18.360293 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:49:18.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.360878 systemd[1]: Starting ignition-mount.service... Feb 9 19:49:18.361323 systemd[1]: Starting sysroot-boot.service... Feb 9 19:49:18.365240 bash[820]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 19:49:18.370732 ignition[821]: INFO : Ignition 2.14.0 Feb 9 19:49:18.371017 ignition[821]: INFO : Stage: mount Feb 9 19:49:18.371198 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:49:18.371355 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 9 19:49:18.372848 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 9 19:49:18.374542 ignition[821]: INFO : mount: mount passed Feb 9 19:49:18.374654 ignition[821]: INFO : Ignition finished successfully Feb 9 19:49:18.377262 systemd[1]: Finished ignition-mount.service. Feb 9 19:49:18.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.382084 systemd[1]: Finished sysroot-boot.service. Feb 9 19:49:18.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:18.646719 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:49:18.654509 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (830) Feb 9 19:49:18.654533 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:49:18.656125 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:49:18.656139 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:49:18.660503 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:49:18.661358 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:49:18.661989 systemd[1]: Starting ignition-files.service... Feb 9 19:49:18.670887 ignition[850]: INFO : Ignition 2.14.0 Feb 9 19:49:18.670887 ignition[850]: INFO : Stage: files Feb 9 19:49:18.671187 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:49:18.671187 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 9 19:49:18.672195 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 9 19:49:18.674437 ignition[850]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:49:18.674850 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:49:18.674850 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:49:18.677761 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:49:18.677966 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:49:18.678858 unknown[850]: wrote ssh authorized keys file for user: core Feb 9 19:49:18.679286 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:49:18.679741 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:49:18.679741 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:49:18.703307 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:49:18.755979 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:49:18.756248 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:49:18.756472 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:49:19.234757 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:49:19.274763 systemd-networkd[730]: ens192: Gained IPv6LL Feb 9 19:49:19.342373 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:49:19.342693 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:49:19.342693 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:49:19.342693 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:49:19.768595 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:49:19.823128 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:49:19.823439 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:49:19.830004 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:49:19.830164 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:49:19.986579 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:49:20.143994 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 19:49:20.144321 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:49:20.144535 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:49:20.144769 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:49:20.191707 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 19:49:20.662163 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 19:49:20.662510 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:49:20.662705 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:49:20.662912 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:49:20.710341 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 19:49:20.882118 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:49:20.882529 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:49:20.883891 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:49:20.883891 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:49:20.885440 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:49:20.885609 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:49:20.891434 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 9 19:49:20.891617 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:49:20.894347 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3857729329" Feb 9 19:49:20.894562 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3857729329": device or resource busy Feb 9 19:49:20.894770 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3857729329", trying btrfs: device or resource busy Feb 9 19:49:20.894991 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3857729329" Feb 9 19:49:20.896458 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3857729329" Feb 9 19:49:20.896639 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (853) Feb 9 19:49:20.903803 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3857729329" Feb 9 19:49:20.904092 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3857729329" Feb 9 19:49:20.904344 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 9 19:49:20.904876 systemd[1]: mnt-oem3857729329.mount: Deactivated successfully. Feb 9 19:49:20.911272 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 9 19:49:20.911614 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 9 19:49:20.911874 ignition[850]: INFO : files: op(14): [started] processing unit "vmtoolsd.service" Feb 9 19:49:20.912065 ignition[850]: INFO : files: op(14): [finished] processing unit "vmtoolsd.service" Feb 9 19:49:20.912262 ignition[850]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:49:20.912484 ignition[850]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:49:20.912823 ignition[850]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:49:20.913080 ignition[850]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:49:20.913278 ignition[850]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 19:49:20.913489 ignition[850]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:49:20.913825 ignition[850]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:49:20.914083 ignition[850]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 19:49:20.914279 ignition[850]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 19:49:20.914490 ignition[850]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:49:20.914817 ignition[850]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:49:20.915062 ignition[850]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 19:49:20.915255 ignition[850]: INFO : files: op(1b): [started] processing unit "coreos-metadata.service" Feb 9 19:49:20.915471 ignition[850]: INFO : files: op(1b): op(1c): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 19:49:20.915799 ignition[850]: INFO : files: op(1b): op(1c): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 19:49:20.916052 ignition[850]: INFO : files: op(1b): [finished] processing unit "coreos-metadata.service" Feb 9 19:49:20.916252 ignition[850]: INFO : files: op(1d): [started] setting preset to enabled for "vmtoolsd.service" Feb 9 19:49:20.916537 ignition[850]: INFO : files: op(1d): [finished] setting preset to enabled for "vmtoolsd.service" Feb 9 19:49:20.916739 ignition[850]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(21): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 19:49:20.917071 ignition[850]: INFO : files: op(21): op(22): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 19:49:21.223963 ignition[850]: INFO : files: op(21): op(22): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 19:49:21.224206 ignition[850]: INFO : files: op(21): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 19:49:21.224452 ignition[850]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:49:21.224729 ignition[850]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:49:21.224934 ignition[850]: INFO : files: files passed Feb 9 19:49:21.225067 ignition[850]: INFO : Ignition finished successfully Feb 9 19:49:21.226176 systemd[1]: Finished ignition-files.service. Feb 9 19:49:21.230145 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 9 19:49:21.230166 kernel: audit: type=1130 audit(1707508161.224:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.227286 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:49:21.230195 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:49:21.230657 systemd[1]: Starting ignition-quench.service... Feb 9 19:49:21.233107 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:49:21.239384 kernel: audit: type=1130 audit(1707508161.231:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.239412 kernel: audit: type=1131 audit(1707508161.231:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.233162 systemd[1]: Finished ignition-quench.service. Feb 9 19:49:21.239698 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:49:21.240045 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:49:21.243460 kernel: audit: type=1130 audit(1707508161.238:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.240216 systemd[1]: Reached target ignition-complete.target. Feb 9 19:49:21.243934 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:49:21.253293 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:49:21.253517 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:49:21.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.253831 systemd[1]: Reached target initrd-fs.target. Feb 9 19:49:21.258780 kernel: audit: type=1130 audit(1707508161.252:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.258795 kernel: audit: type=1131 audit(1707508161.252:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.258925 systemd[1]: Reached target initrd.target. Feb 9 19:49:21.259151 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:49:21.259765 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:49:21.266400 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:49:21.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.267150 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:49:21.269845 kernel: audit: type=1130 audit(1707508161.265:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.274313 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:49:21.274503 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:49:21.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.275121 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:49:21.279560 kernel: audit: type=1130 audit(1707508161.273:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.279573 kernel: audit: type=1131 audit(1707508161.273:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.279616 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:49:21.279734 systemd[1]: Stopped target timers.target. Feb 9 19:49:21.279916 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:49:21.282518 kernel: audit: type=1131 audit(1707508161.278:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.279941 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:49:21.280068 systemd[1]: Stopped target initrd.target. Feb 9 19:49:21.282570 systemd[1]: Stopped target basic.target. Feb 9 19:49:21.282745 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:49:21.282905 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:49:21.283067 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:49:21.283240 systemd[1]: Stopped target remote-fs.target. Feb 9 19:49:21.283402 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:49:21.283590 systemd[1]: Stopped target sysinit.target. Feb 9 19:49:21.283743 systemd[1]: Stopped target local-fs.target. Feb 9 19:49:21.283901 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:49:21.284061 systemd[1]: Stopped target swap.target. Feb 9 19:49:21.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.284215 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:49:21.284237 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:49:21.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.284398 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:49:21.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.284545 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:49:21.284565 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:49:21.284743 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:49:21.284764 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:49:21.284901 systemd[1]: Stopped target paths.target. Feb 9 19:49:21.285037 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:49:21.289518 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:49:21.289624 systemd[1]: Stopped target slices.target. Feb 9 19:49:21.289791 systemd[1]: Stopped target sockets.target. Feb 9 19:49:21.289968 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:49:21.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.289989 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:49:21.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.290137 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:49:21.290155 systemd[1]: Stopped ignition-files.service. Feb 9 19:49:21.290680 systemd[1]: Stopping ignition-mount.service... Feb 9 19:49:21.290920 iscsid[741]: iscsid shutting down. Feb 9 19:49:21.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.291529 systemd[1]: Stopping iscsid.service... Feb 9 19:49:21.292008 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:49:21.292115 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:49:21.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.300249 ignition[889]: INFO : Ignition 2.14.0 Feb 9 19:49:21.300249 ignition[889]: INFO : Stage: umount Feb 9 19:49:21.300249 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:49:21.300249 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 9 19:49:21.292143 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:49:21.292267 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:49:21.292293 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:49:21.292582 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:49:21.292632 systemd[1]: Stopped iscsid.service. Feb 9 19:49:21.292763 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:49:21.292778 systemd[1]: Closed iscsid.socket. Feb 9 19:49:21.292892 systemd[1]: Stopping iscsiuio.service... Feb 9 19:49:21.295763 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:49:21.295810 systemd[1]: Stopped iscsiuio.service. Feb 9 19:49:21.299663 systemd[1]: Stopped target network.target. Feb 9 19:49:21.299758 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:49:21.299778 systemd[1]: Closed iscsiuio.socket. Feb 9 19:49:21.299912 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:49:21.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.300082 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:49:21.301315 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:49:21.303652 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:49:21.303704 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:49:21.305127 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 9 19:49:21.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.307672 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:49:21.307724 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:49:21.307889 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:49:21.307906 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:49:21.308355 systemd[1]: Stopping network-cleanup.service... Feb 9 19:49:21.308447 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:49:21.308473 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:49:21.308614 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Feb 9 19:49:21.308634 systemd[1]: Stopped afterburn-network-kargs.service. Feb 9 19:49:21.308738 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:49:21.308757 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:49:21.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.310680 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:49:21.311904 ignition[889]: INFO : umount: umount passed Feb 9 19:49:21.311904 ignition[889]: INFO : Ignition finished successfully Feb 9 19:49:21.310718 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:49:21.311422 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:49:21.311690 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:49:21.311000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:49:21.312728 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:49:21.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.313402 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:49:21.313597 systemd[1]: Stopped ignition-mount.service. Feb 9 19:49:21.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.314238 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:49:21.314266 systemd[1]: Stopped ignition-disks.service. Feb 9 19:49:21.313000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:49:21.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.314769 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:49:21.314793 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:49:21.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.315172 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:49:21.315195 systemd[1]: Stopped ignition-setup.service. Feb 9 19:49:21.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.315705 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:49:21.315729 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:49:21.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.316117 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:49:21.317217 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:49:21.317636 systemd[1]: Stopped network-cleanup.service. Feb 9 19:49:21.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.320316 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:49:21.320389 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:49:21.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.320970 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:49:21.321000 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:49:21.321352 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:49:21.321371 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:49:21.321682 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:49:21.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.321703 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:49:21.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.321930 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:49:21.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.321951 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:49:21.322197 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:49:21.322218 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:49:21.323230 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:49:21.323442 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:49:21.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.323467 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:49:21.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.323780 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:49:21.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.323802 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:49:21.324079 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:49:21.324100 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:49:21.325431 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:49:21.326187 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:49:21.326234 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:49:21.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:21.326705 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:49:21.327257 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:49:21.333760 systemd[1]: Switching root. Feb 9 19:49:21.349553 systemd-journald[217]: Journal stopped Feb 9 19:49:24.241432 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Feb 9 19:49:24.241458 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:49:24.241466 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:49:24.241473 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:49:24.241478 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:49:24.241485 kernel: SELinux: policy capability open_perms=1 Feb 9 19:49:24.241492 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:49:24.242717 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:49:24.242726 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:49:24.242732 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:49:24.242738 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:49:24.242747 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:49:24.242757 systemd[1]: Successfully loaded SELinux policy in 37.431ms. Feb 9 19:49:24.242765 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.492ms. Feb 9 19:49:24.242773 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:49:24.242780 systemd[1]: Detected virtualization vmware. Feb 9 19:49:24.242787 systemd[1]: Detected architecture x86-64. Feb 9 19:49:24.242794 systemd[1]: Detected first boot. Feb 9 19:49:24.242800 systemd[1]: Initializing machine ID from random generator. Feb 9 19:49:24.242807 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:49:24.242813 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:49:24.242820 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:49:24.242827 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:49:24.242834 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:49:24.242842 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:49:24.242849 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:49:24.242855 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:49:24.242862 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:49:24.242868 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:49:24.242875 systemd[1]: Created slice system-getty.slice. Feb 9 19:49:24.242883 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:49:24.242894 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:49:24.242901 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:49:24.242907 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:49:24.242913 systemd[1]: Created slice user.slice. Feb 9 19:49:24.242920 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:49:24.242926 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:49:24.242932 systemd[1]: Set up automount boot.automount. Feb 9 19:49:24.242939 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:49:24.242951 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:49:24.242964 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:49:24.242976 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:49:24.242983 systemd[1]: Reached target integritysetup.target. Feb 9 19:49:24.242990 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:49:24.242997 systemd[1]: Reached target remote-fs.target. Feb 9 19:49:24.243003 systemd[1]: Reached target slices.target. Feb 9 19:49:24.243010 systemd[1]: Reached target swap.target. Feb 9 19:49:24.243017 systemd[1]: Reached target torcx.target. Feb 9 19:49:24.243025 systemd[1]: Reached target veritysetup.target. Feb 9 19:49:24.243032 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:49:24.243039 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:49:24.243045 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:49:24.243052 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:49:24.243059 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:49:24.243067 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:49:24.243076 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:49:24.243087 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:49:24.243094 systemd[1]: Mounting media.mount... Feb 9 19:49:24.243101 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:49:24.243108 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:49:24.243115 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:49:24.243127 systemd[1]: Mounting tmp.mount... Feb 9 19:49:24.243141 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:49:24.243153 systemd[1]: Starting ignition-delete-config.service... Feb 9 19:49:24.243165 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:49:24.243172 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:49:24.243182 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:49:24.243193 systemd[1]: Starting modprobe@drm.service... Feb 9 19:49:24.243200 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:49:24.243207 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:49:24.243216 systemd[1]: Starting modprobe@loop.service... Feb 9 19:49:24.243225 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:49:24.243234 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:49:24.243240 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:49:24.243247 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:49:24.243254 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:49:24.243260 systemd[1]: Stopped systemd-journald.service. Feb 9 19:49:24.243267 systemd[1]: Starting systemd-journald.service... Feb 9 19:49:24.243274 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:49:24.243282 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:49:24.243289 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:49:24.243296 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:49:24.243303 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:49:24.243309 systemd[1]: Stopped verity-setup.service. Feb 9 19:49:24.243316 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:49:24.243323 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:49:24.243330 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:49:24.243337 systemd[1]: Mounted media.mount. Feb 9 19:49:24.243347 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:49:24.243358 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:49:24.243368 systemd[1]: Mounted tmp.mount. Feb 9 19:49:24.243379 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:49:24.243390 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:49:24.243397 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:49:24.243404 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:49:24.243410 systemd[1]: Finished modprobe@drm.service. Feb 9 19:49:24.243418 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:49:24.243429 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:49:24.243436 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:49:24.243443 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:49:24.243450 systemd[1]: Reached target network-pre.target. Feb 9 19:49:24.243456 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:49:24.243463 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:49:24.243470 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:49:24.243477 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:49:24.243488 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:49:24.243513 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:49:24.243526 systemd-journald[1002]: Journal started Feb 9 19:49:24.243562 systemd-journald[1002]: Runtime Journal (/run/log/journal/85152b63818e4f3cae12de507d45cf98) is 4.8M, max 38.8M, 34.0M free. Feb 9 19:49:21.421000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:49:24.247532 systemd[1]: Started systemd-journald.service. Feb 9 19:49:21.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:49:21.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:49:21.462000 audit: BPF prog-id=10 op=LOAD Feb 9 19:49:21.462000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:49:21.462000 audit: BPF prog-id=11 op=LOAD Feb 9 19:49:21.462000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:49:21.533000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:49:21.533000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:49:21.533000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:49:21.535000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:49:21.535000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:49:21.535000 audit: CWD cwd="/" Feb 9 19:49:21.535000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:21.535000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:21.535000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:49:24.083000 audit: BPF prog-id=12 op=LOAD Feb 9 19:49:24.083000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:49:24.083000 audit: BPF prog-id=13 op=LOAD Feb 9 19:49:24.083000 audit: BPF prog-id=14 op=LOAD Feb 9 19:49:24.083000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:49:24.083000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:49:24.084000 audit: BPF prog-id=15 op=LOAD Feb 9 19:49:24.084000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:49:24.084000 audit: BPF prog-id=16 op=LOAD Feb 9 19:49:24.084000 audit: BPF prog-id=17 op=LOAD Feb 9 19:49:24.084000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:49:24.084000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:49:24.085000 audit: BPF prog-id=18 op=LOAD Feb 9 19:49:24.085000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:49:24.085000 audit: BPF prog-id=19 op=LOAD Feb 9 19:49:24.085000 audit: BPF prog-id=20 op=LOAD Feb 9 19:49:24.085000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:49:24.085000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:49:24.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.091000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:49:24.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.169000 audit: BPF prog-id=21 op=LOAD Feb 9 19:49:24.169000 audit: BPF prog-id=22 op=LOAD Feb 9 19:49:24.169000 audit: BPF prog-id=23 op=LOAD Feb 9 19:49:24.169000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:49:24.169000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:49:24.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.225000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:49:24.225000 audit[1002]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd36a44170 a2=4000 a3=7ffd36a4420c items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:49:24.225000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:49:24.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.083184 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:49:21.533193 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:49:24.087352 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:49:21.533720 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:49:24.245891 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:49:21.533731 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:49:24.246721 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:49:21.533751 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:49:24.246919 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:49:21.533757 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:49:21.533775 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:49:21.533782 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:49:21.533904 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:49:24.250352 jq[989]: true Feb 9 19:49:21.533924 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:49:21.533931 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:49:21.534376 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:49:21.534395 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:49:21.534406 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:49:21.534414 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:49:21.534422 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:49:21.534430 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:49:23.343135 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:49:23.343343 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:49:23.343427 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:49:23.343586 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:49:24.254661 jq[1007]: true Feb 9 19:49:23.343636 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:49:23.343705 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-02-09T19:49:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:49:24.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.256508 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:49:24.256613 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:49:24.257562 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:49:24.259624 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:49:24.272869 systemd-journald[1002]: Time spent on flushing to /var/log/journal/85152b63818e4f3cae12de507d45cf98 is 32.355ms for 2041 entries. Feb 9 19:49:24.272869 systemd-journald[1002]: System Journal (/var/log/journal/85152b63818e4f3cae12de507d45cf98) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:49:24.344233 systemd-journald[1002]: Received client request to flush runtime journal. Feb 9 19:49:24.344263 kernel: loop: module loaded Feb 9 19:49:24.344278 kernel: fuse: init (API version 7.34) Feb 9 19:49:24.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.285894 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:49:24.286012 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:49:24.286268 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:49:24.286375 systemd[1]: Finished modprobe@loop.service. Feb 9 19:49:24.287292 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:49:24.287410 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:49:24.289129 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:49:24.299795 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:49:24.302863 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:49:24.303842 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:49:24.339464 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:49:24.340394 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:49:24.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.358326 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:49:24.358971 udevadm[1047]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:49:24.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.430081 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:49:24.431106 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:49:24.577995 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:49:24.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.724173 ignition[1014]: Ignition 2.14.0 Feb 9 19:49:24.724798 ignition[1014]: deleting config from guestinfo properties Feb 9 19:49:24.727402 ignition[1014]: Successfully deleted config Feb 9 19:49:24.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:24.728104 systemd[1]: Finished ignition-delete-config.service. Feb 9 19:49:25.040161 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:49:25.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.039000 audit: BPF prog-id=24 op=LOAD Feb 9 19:49:25.039000 audit: BPF prog-id=25 op=LOAD Feb 9 19:49:25.039000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:49:25.039000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:49:25.041349 systemd[1]: Starting systemd-udevd.service... Feb 9 19:49:25.053066 systemd-udevd[1055]: Using default interface naming scheme 'v252'. Feb 9 19:49:25.166558 systemd[1]: Started systemd-udevd.service. Feb 9 19:49:25.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.166000 audit: BPF prog-id=26 op=LOAD Feb 9 19:49:25.168777 systemd[1]: Starting systemd-networkd.service... Feb 9 19:49:25.178000 audit: BPF prog-id=27 op=LOAD Feb 9 19:49:25.178000 audit: BPF prog-id=28 op=LOAD Feb 9 19:49:25.178000 audit: BPF prog-id=29 op=LOAD Feb 9 19:49:25.180904 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:49:25.196338 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:49:25.222734 systemd[1]: Started systemd-userdbd.service. Feb 9 19:49:25.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.232510 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:49:25.239746 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:49:25.316000 audit[1061]: AVC avc: denied { confidentiality } for pid=1061 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:49:25.316000 audit[1061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ec80c9d9d0 a1=32194 a2=7f7aea3aabc5 a3=5 items=108 ppid=1055 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:49:25.316000 audit: CWD cwd="/" Feb 9 19:49:25.316000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=1 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=2 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=3 name=(null) inode=19901 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=4 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=5 name=(null) inode=19902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=6 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=7 name=(null) inode=19903 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=8 name=(null) inode=19903 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=9 name=(null) inode=19904 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=10 name=(null) inode=19903 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=11 name=(null) inode=19905 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=12 name=(null) inode=19903 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=13 name=(null) inode=19906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=14 name=(null) inode=19903 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=15 name=(null) inode=19907 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=16 name=(null) inode=19903 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=17 name=(null) inode=19908 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=18 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=19 name=(null) inode=19909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=20 name=(null) inode=19909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=21 name=(null) inode=19910 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=22 name=(null) inode=19909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=23 name=(null) inode=19911 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=24 name=(null) inode=19909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=25 name=(null) inode=19912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=26 name=(null) inode=19909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=27 name=(null) inode=19913 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=28 name=(null) inode=19909 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=29 name=(null) inode=19914 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=30 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=31 name=(null) inode=19915 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=32 name=(null) inode=19915 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=33 name=(null) inode=19916 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=34 name=(null) inode=19915 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=35 name=(null) inode=19917 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=36 name=(null) inode=19915 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=37 name=(null) inode=19918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=38 name=(null) inode=19915 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=39 name=(null) inode=19919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=40 name=(null) inode=19915 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=41 name=(null) inode=19920 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=42 name=(null) inode=19900 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=43 name=(null) inode=19921 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=44 name=(null) inode=19921 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=45 name=(null) inode=19922 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=46 name=(null) inode=19921 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=47 name=(null) inode=19923 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=48 name=(null) inode=19921 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=49 name=(null) inode=19924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=50 name=(null) inode=19921 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=51 name=(null) inode=19925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=52 name=(null) inode=19921 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=53 name=(null) inode=19926 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=55 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=56 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=57 name=(null) inode=19928 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=58 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=59 name=(null) inode=19929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=60 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=61 name=(null) inode=19930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=62 name=(null) inode=19930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=63 name=(null) inode=19931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=64 name=(null) inode=19930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=65 name=(null) inode=19932 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=66 name=(null) inode=19930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=67 name=(null) inode=19933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=68 name=(null) inode=19930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=69 name=(null) inode=19934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=70 name=(null) inode=19930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=71 name=(null) inode=19935 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=72 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=73 name=(null) inode=19936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=74 name=(null) inode=19936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=75 name=(null) inode=19937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=76 name=(null) inode=19936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=77 name=(null) inode=19938 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=78 name=(null) inode=19936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=79 name=(null) inode=19939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=80 name=(null) inode=19936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=81 name=(null) inode=19940 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=82 name=(null) inode=19936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=83 name=(null) inode=19941 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=84 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=85 name=(null) inode=19942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=86 name=(null) inode=19942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=87 name=(null) inode=19943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=88 name=(null) inode=19942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=89 name=(null) inode=19944 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=90 name=(null) inode=19942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=91 name=(null) inode=19945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=92 name=(null) inode=19942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=93 name=(null) inode=19946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=94 name=(null) inode=19942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=95 name=(null) inode=19947 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=96 name=(null) inode=19927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=97 name=(null) inode=19948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=98 name=(null) inode=19948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=99 name=(null) inode=19949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=100 name=(null) inode=19948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=101 name=(null) inode=19950 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=102 name=(null) inode=19948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=103 name=(null) inode=19951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=104 name=(null) inode=19948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=105 name=(null) inode=19952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=106 name=(null) inode=19948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PATH item=107 name=(null) inode=19953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:49:25.316000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:49:25.326948 (udev-worker)[1056]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Feb 9 19:49:25.337548 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Feb 9 19:49:25.337710 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Feb 9 19:49:25.338504 kernel: Guest personality initialized and is active Feb 9 19:49:25.339849 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Feb 9 19:49:25.339870 kernel: Initialized host personality Feb 9 19:49:25.356511 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Feb 9 19:49:25.373514 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 19:49:25.386505 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:49:25.483519 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1068) Feb 9 19:49:25.492602 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:49:25.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.504809 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:49:25.505998 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:49:25.540267 systemd-networkd[1065]: lo: Link UP Feb 9 19:49:25.540517 systemd-networkd[1065]: lo: Gained carrier Feb 9 19:49:25.540968 systemd-networkd[1065]: Enumeration completed Feb 9 19:49:25.541107 systemd[1]: Started systemd-networkd.service. Feb 9 19:49:25.541215 systemd-networkd[1065]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Feb 9 19:49:25.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.555530 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 9 19:49:25.555809 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 9 19:49:25.555933 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Feb 9 19:49:25.557454 systemd-networkd[1065]: ens192: Link UP Feb 9 19:49:25.557607 systemd-networkd[1065]: ens192: Gained carrier Feb 9 19:49:25.577324 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:49:25.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.619226 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:49:25.619432 systemd[1]: Reached target cryptsetup.target. Feb 9 19:49:25.620387 systemd[1]: Starting lvm2-activation.service... Feb 9 19:49:25.623172 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:49:25.650148 systemd[1]: Finished lvm2-activation.service. Feb 9 19:49:25.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:25.650349 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:49:25.650453 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:49:25.650472 systemd[1]: Reached target local-fs.target. Feb 9 19:49:25.650573 systemd[1]: Reached target machines.target. Feb 9 19:49:25.651515 systemd[1]: Starting ldconfig.service... Feb 9 19:49:25.671796 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:49:25.671839 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:49:25.672862 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:49:25.673657 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:49:25.674580 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:49:25.674763 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:49:25.674793 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:49:25.675523 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:49:25.694911 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:49:25.716548 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) Feb 9 19:49:25.717228 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:49:25.717423 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:49:25.733042 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:49:25.739852 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:49:25.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:26.975948 systemd-fsck[1099]: fsck.fat 4.2 (2021-01-31) Feb 9 19:49:26.975948 systemd-fsck[1099]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:49:26.976787 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:49:26.979113 kernel: kauditd_printk_skb: 237 callbacks suppressed Feb 9 19:49:26.979157 kernel: audit: type=1130 audit(1707508166.975:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:26.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:26.977767 systemd[1]: Mounting boot.mount... Feb 9 19:49:27.018107 systemd[1]: Mounted boot.mount. Feb 9 19:49:27.143803 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:49:27.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.147522 kernel: audit: type=1130 audit(1707508167.142:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.349839 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:49:27.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.353775 kernel: audit: type=1130 audit(1707508167.348:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.353433 systemd[1]: Starting audit-rules.service... Feb 9 19:49:27.358696 kernel: audit: type=1334 audit(1707508167.354:165): prog-id=30 op=LOAD Feb 9 19:49:27.358738 kernel: audit: type=1334 audit(1707508167.356:166): prog-id=31 op=LOAD Feb 9 19:49:27.354000 audit: BPF prog-id=30 op=LOAD Feb 9 19:49:27.356000 audit: BPF prog-id=31 op=LOAD Feb 9 19:49:27.354246 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:49:27.355011 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:49:27.356026 systemd[1]: Starting systemd-resolved.service... Feb 9 19:49:27.357984 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:49:27.359220 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:49:27.368000 audit[1107]: SYSTEM_BOOT pid=1107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.370270 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:49:27.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.374890 kernel: audit: type=1127 audit(1707508167.368:167): pid=1107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.374922 kernel: audit: type=1130 audit(1707508167.370:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.390412 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:49:27.390572 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:49:27.393577 kernel: audit: type=1130 audit(1707508167.389:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.434528 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:49:27.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.434727 systemd[1]: Reached target time-set.target. Feb 9 19:49:27.438511 kernel: audit: type=1130 audit(1707508167.433:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.457826 systemd-resolved[1105]: Positive Trust Anchors: Feb 9 19:49:27.458188 systemd-resolved[1105]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:49:27.458293 systemd-resolved[1105]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:49:27.468186 systemd-networkd[1065]: ens192: Gained IPv6LL Feb 9 19:49:27.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.484627 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:49:27.488517 kernel: audit: type=1130 audit(1707508167.483:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:49:27.525000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:49:27.525000 audit[1123]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff718cd380 a2=420 a3=0 items=0 ppid=1102 pid=1123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:49:27.525000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:49:27.527366 augenrules[1123]: No rules Feb 9 19:49:27.527830 systemd[1]: Finished audit-rules.service. Feb 9 19:49:27.554266 systemd-resolved[1105]: Defaulting to hostname 'linux'. Feb 9 19:49:27.555705 systemd[1]: Started systemd-resolved.service. Feb 9 19:49:27.555874 systemd[1]: Reached target network.target. Feb 9 19:49:27.555989 systemd[1]: Reached target nss-lookup.target. Feb 9 19:50:12.228170 systemd-resolved[1105]: Clock change detected. Flushing caches. Feb 9 19:50:12.228206 systemd-timesyncd[1106]: Contacted time server 198.137.202.32:123 (0.flatcar.pool.ntp.org). Feb 9 19:50:12.228235 systemd-timesyncd[1106]: Initial clock synchronization to Fri 2024-02-09 19:50:12.228137 UTC. Feb 9 19:50:12.294833 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:50:12.295325 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:50:13.506097 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:50:13.618937 systemd[1]: Finished ldconfig.service. Feb 9 19:50:13.620416 systemd[1]: Starting systemd-update-done.service... Feb 9 19:50:13.625417 systemd[1]: Finished systemd-update-done.service. Feb 9 19:50:13.625626 systemd[1]: Reached target sysinit.target. Feb 9 19:50:13.625784 systemd[1]: Started motdgen.path. Feb 9 19:50:13.625920 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:50:13.626140 systemd[1]: Started logrotate.timer. Feb 9 19:50:13.626281 systemd[1]: Started mdadm.timer. Feb 9 19:50:13.626377 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:50:13.626482 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:50:13.626513 systemd[1]: Reached target paths.target. Feb 9 19:50:13.626609 systemd[1]: Reached target timers.target. Feb 9 19:50:13.626945 systemd[1]: Listening on dbus.socket. Feb 9 19:50:13.628010 systemd[1]: Starting docker.socket... Feb 9 19:50:13.632276 systemd[1]: Listening on sshd.socket. Feb 9 19:50:13.632574 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:50:13.633140 systemd[1]: Listening on docker.socket. Feb 9 19:50:13.633355 systemd[1]: Reached target sockets.target. Feb 9 19:50:13.633522 systemd[1]: Reached target basic.target. Feb 9 19:50:13.633690 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:50:13.633704 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:50:13.634745 systemd[1]: Starting containerd.service... Feb 9 19:50:13.635961 systemd[1]: Starting dbus.service... Feb 9 19:50:13.637024 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:50:13.638096 systemd[1]: Starting extend-filesystems.service... Feb 9 19:50:13.638793 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:50:13.639617 jq[1135]: false Feb 9 19:50:13.639762 systemd[1]: Starting motdgen.service... Feb 9 19:50:13.640841 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:50:13.641829 systemd[1]: Starting prepare-critools.service... Feb 9 19:50:13.642892 systemd[1]: Starting prepare-helm.service... Feb 9 19:50:13.644281 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:50:13.645345 systemd[1]: Starting sshd-keygen.service... Feb 9 19:50:13.649705 systemd[1]: Starting systemd-logind.service... Feb 9 19:50:13.649978 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:50:13.650015 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:50:13.650482 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:50:13.651456 systemd[1]: Starting update-engine.service... Feb 9 19:50:13.653961 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:50:13.655244 systemd[1]: Starting vmtoolsd.service... Feb 9 19:50:13.657003 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:50:13.657112 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:50:13.659659 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:50:13.659754 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:50:13.666102 jq[1147]: true Feb 9 19:50:13.667130 jq[1157]: true Feb 9 19:50:13.680666 systemd[1]: Started vmtoolsd.service. Feb 9 19:50:13.684674 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:50:13.684764 systemd[1]: Finished motdgen.service. Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda1 Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda2 Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda3 Feb 9 19:50:13.699615 extend-filesystems[1136]: Found usr Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda4 Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda6 Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda7 Feb 9 19:50:13.699615 extend-filesystems[1136]: Found sda9 Feb 9 19:50:13.699615 extend-filesystems[1136]: Checking size of /dev/sda9 Feb 9 19:50:13.735415 env[1176]: time="2024-02-09T19:50:13.734989149Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:50:13.736785 tar[1153]: ./ Feb 9 19:50:13.736785 tar[1153]: ./loopback Feb 9 19:50:13.740014 tar[1154]: crictl Feb 9 19:50:13.741060 tar[1155]: linux-amd64/helm Feb 9 19:50:13.758159 systemd-logind[1145]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:50:13.758182 systemd-logind[1145]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:50:13.759187 systemd-logind[1145]: New seat seat0. Feb 9 19:50:13.766688 bash[1174]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:50:13.766634 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:50:13.775609 extend-filesystems[1136]: Old size kept for /dev/sda9 Feb 9 19:50:13.777239 extend-filesystems[1136]: Found sr0 Feb 9 19:50:13.777039 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:50:13.777143 systemd[1]: Finished extend-filesystems.service. Feb 9 19:50:13.785749 kernel: NET: Registered PF_VSOCK protocol family Feb 9 19:50:13.788287 dbus-daemon[1134]: [system] SELinux support is enabled Feb 9 19:50:13.788397 systemd[1]: Started dbus.service. Feb 9 19:50:13.789672 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:50:13.789692 systemd[1]: Reached target system-config.target. Feb 9 19:50:13.789817 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:50:13.789828 systemd[1]: Reached target user-config.target. Feb 9 19:50:13.792721 systemd[1]: Started systemd-logind.service. Feb 9 19:50:13.826173 tar[1153]: ./bandwidth Feb 9 19:50:13.874500 env[1176]: time="2024-02-09T19:50:13.874476931Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:50:13.876770 env[1176]: time="2024-02-09T19:50:13.876398736Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:50:13.879226 env[1176]: time="2024-02-09T19:50:13.879207939Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:50:13.879310 env[1176]: time="2024-02-09T19:50:13.879271961Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:50:13.879811 env[1176]: time="2024-02-09T19:50:13.879798383Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:50:13.880009 env[1176]: time="2024-02-09T19:50:13.879999162Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:50:13.880145 env[1176]: time="2024-02-09T19:50:13.880135294Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:50:13.880192 env[1176]: time="2024-02-09T19:50:13.880182858Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:50:13.880308 env[1176]: time="2024-02-09T19:50:13.880298710Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:50:13.881218 env[1176]: time="2024-02-09T19:50:13.881207671Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:50:13.881562 env[1176]: time="2024-02-09T19:50:13.881549253Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:50:13.881823 env[1176]: time="2024-02-09T19:50:13.881813673Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:50:13.882043 env[1176]: time="2024-02-09T19:50:13.882029121Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:50:13.882096 env[1176]: time="2024-02-09T19:50:13.882086566Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:50:13.899613 tar[1153]: ./ptp Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902699638Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902733533Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902745099Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902767789Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902778613Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902789931Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902796980Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902804980Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902813622Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902824774Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902833610Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902844141Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.902970260Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:50:13.904359 env[1176]: time="2024-02-09T19:50:13.903030118Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903215784Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903238075Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903258277Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903303137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903317019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903331839Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903344537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903357651Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903369027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903379682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903389601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903401419Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903498097Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903512716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.904748 env[1176]: time="2024-02-09T19:50:13.903525663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.906619 env[1176]: time="2024-02-09T19:50:13.903537524Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:50:13.906619 env[1176]: time="2024-02-09T19:50:13.903552511Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:50:13.906619 env[1176]: time="2024-02-09T19:50:13.903563494Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:50:13.906619 env[1176]: time="2024-02-09T19:50:13.903578658Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:50:13.906619 env[1176]: time="2024-02-09T19:50:13.903608706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:50:13.905104 systemd[1]: Started containerd.service. Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.903753852Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.903798983Z" level=info msg="Connect containerd service" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.903822449Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904218421Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904287622Z" level=info msg="Start subscribing containerd event" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904320844Z" level=info msg="Start recovering state" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904366431Z" level=info msg="Start event monitor" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904373824Z" level=info msg="Start snapshots syncer" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904379058Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904383500Z" level=info msg="Start streaming server" Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904963329Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.904993939Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:50:13.906805 env[1176]: time="2024-02-09T19:50:13.905033803Z" level=info msg="containerd successfully booted in 0.170539s" Feb 9 19:50:13.910987 update_engine[1146]: I0209 19:50:13.906388 1146 main.cc:92] Flatcar Update Engine starting Feb 9 19:50:13.909740 systemd[1]: Started update-engine.service. Feb 9 19:50:13.911428 systemd[1]: Started locksmithd.service. Feb 9 19:50:13.913229 update_engine[1146]: I0209 19:50:13.911839 1146 update_check_scheduler.cc:74] Next update check in 7m11s Feb 9 19:50:13.962412 tar[1153]: ./vlan Feb 9 19:50:14.012907 tar[1153]: ./host-device Feb 9 19:50:14.063000 tar[1153]: ./tuning Feb 9 19:50:14.105894 tar[1153]: ./vrf Feb 9 19:50:14.151327 tar[1153]: ./sbr Feb 9 19:50:14.201336 tar[1153]: ./tap Feb 9 19:50:14.254000 tar[1153]: ./dhcp Feb 9 19:50:14.379559 tar[1153]: ./static Feb 9 19:50:14.405975 tar[1155]: linux-amd64/LICENSE Feb 9 19:50:14.406081 tar[1155]: linux-amd64/README.md Feb 9 19:50:14.414001 tar[1153]: ./firewall Feb 9 19:50:14.415169 systemd[1]: Finished prepare-helm.service. Feb 9 19:50:14.440091 tar[1153]: ./macvlan Feb 9 19:50:14.462799 tar[1153]: ./dummy Feb 9 19:50:14.484874 tar[1153]: ./bridge Feb 9 19:50:14.510240 tar[1153]: ./ipvlan Feb 9 19:50:14.533889 tar[1153]: ./portmap Feb 9 19:50:14.542980 systemd[1]: Finished prepare-critools.service. Feb 9 19:50:14.556910 tar[1153]: ./host-local Feb 9 19:50:14.599254 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:50:15.065637 sshd_keygen[1160]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:50:15.080191 systemd[1]: Finished sshd-keygen.service. Feb 9 19:50:15.081353 systemd[1]: Starting issuegen.service... Feb 9 19:50:15.084750 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:50:15.084857 systemd[1]: Finished issuegen.service. Feb 9 19:50:15.086136 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:50:15.100841 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:50:15.101926 systemd[1]: Started getty@tty1.service. Feb 9 19:50:15.102822 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:50:15.103035 systemd[1]: Reached target getty.target. Feb 9 19:50:15.103171 systemd[1]: Reached target multi-user.target. Feb 9 19:50:15.104115 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:50:15.108860 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:50:15.108976 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:50:15.109156 systemd[1]: Startup finished in 878ms (kernel) + 5.828s (initrd) + 9.120s (userspace) = 15.827s. Feb 9 19:50:15.313324 locksmithd[1204]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:50:15.487292 login[1267]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:50:15.488501 login[1268]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:50:15.564869 systemd[1]: Created slice user-500.slice. Feb 9 19:50:15.565750 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:50:15.567210 systemd-logind[1145]: New session 2 of user core. Feb 9 19:50:15.569396 systemd-logind[1145]: New session 1 of user core. Feb 9 19:50:15.579573 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:50:15.581088 systemd[1]: Starting user@500.service... Feb 9 19:50:15.599676 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:15.817254 systemd[1272]: Queued start job for default target default.target. Feb 9 19:50:15.817621 systemd[1272]: Reached target paths.target. Feb 9 19:50:15.817635 systemd[1272]: Reached target sockets.target. Feb 9 19:50:15.817643 systemd[1272]: Reached target timers.target. Feb 9 19:50:15.817651 systemd[1272]: Reached target basic.target. Feb 9 19:50:15.817678 systemd[1272]: Reached target default.target. Feb 9 19:50:15.817694 systemd[1272]: Startup finished in 214ms. Feb 9 19:50:15.817753 systemd[1]: Started user@500.service. Feb 9 19:50:15.818548 systemd[1]: Started session-1.scope. Feb 9 19:50:15.819061 systemd[1]: Started session-2.scope. Feb 9 19:50:53.928925 systemd[1]: Created slice system-sshd.slice. Feb 9 19:50:53.929729 systemd[1]: Started sshd@0-139.178.70.108:22-139.178.89.65:39990.service. Feb 9 19:50:53.988834 sshd[1293]: Accepted publickey for core from 139.178.89.65 port 39990 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:53.989719 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:53.993554 systemd[1]: Started session-3.scope. Feb 9 19:50:53.993935 systemd-logind[1145]: New session 3 of user core. Feb 9 19:50:54.041812 systemd[1]: Started sshd@1-139.178.70.108:22-139.178.89.65:39994.service. Feb 9 19:50:54.079354 sshd[1298]: Accepted publickey for core from 139.178.89.65 port 39994 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:54.080344 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:54.083539 systemd[1]: Started session-4.scope. Feb 9 19:50:54.083669 systemd-logind[1145]: New session 4 of user core. Feb 9 19:50:54.132583 sshd[1298]: pam_unix(sshd:session): session closed for user core Feb 9 19:50:54.134510 systemd[1]: Started sshd@2-139.178.70.108:22-139.178.89.65:39998.service. Feb 9 19:50:54.135549 systemd[1]: sshd@1-139.178.70.108:22-139.178.89.65:39994.service: Deactivated successfully. Feb 9 19:50:54.135909 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:50:54.136586 systemd-logind[1145]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:50:54.137141 systemd-logind[1145]: Removed session 4. Feb 9 19:50:54.160120 sshd[1303]: Accepted publickey for core from 139.178.89.65 port 39998 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:54.161005 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:54.163739 systemd[1]: Started session-5.scope. Feb 9 19:50:54.164556 systemd-logind[1145]: New session 5 of user core. Feb 9 19:50:54.212395 sshd[1303]: pam_unix(sshd:session): session closed for user core Feb 9 19:50:54.214959 systemd[1]: Started sshd@3-139.178.70.108:22-139.178.89.65:40010.service. Feb 9 19:50:54.215344 systemd[1]: sshd@2-139.178.70.108:22-139.178.89.65:39998.service: Deactivated successfully. Feb 9 19:50:54.215753 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:50:54.216186 systemd-logind[1145]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:50:54.216832 systemd-logind[1145]: Removed session 5. Feb 9 19:50:54.243028 sshd[1309]: Accepted publickey for core from 139.178.89.65 port 40010 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:54.243725 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:54.246116 systemd-logind[1145]: New session 6 of user core. Feb 9 19:50:54.246532 systemd[1]: Started session-6.scope. Feb 9 19:50:54.296837 sshd[1309]: pam_unix(sshd:session): session closed for user core Feb 9 19:50:54.298625 systemd[1]: sshd@3-139.178.70.108:22-139.178.89.65:40010.service: Deactivated successfully. Feb 9 19:50:54.298964 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:50:54.299352 systemd-logind[1145]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:50:54.299924 systemd[1]: Started sshd@4-139.178.70.108:22-139.178.89.65:40016.service. Feb 9 19:50:54.300553 systemd-logind[1145]: Removed session 6. Feb 9 19:50:54.326455 sshd[1316]: Accepted publickey for core from 139.178.89.65 port 40016 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:54.327338 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:54.330155 systemd-logind[1145]: New session 7 of user core. Feb 9 19:50:54.330715 systemd[1]: Started session-7.scope. Feb 9 19:50:54.393051 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:50:54.393238 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:50:54.399987 dbus-daemon[1134]: \xd0M\xd3j\xf7U: received setenforce notice (enforcing=-336488240) Feb 9 19:50:54.400172 sudo[1319]: pam_unix(sudo:session): session closed for user root Feb 9 19:50:54.402424 sshd[1316]: pam_unix(sshd:session): session closed for user core Feb 9 19:50:54.404736 systemd[1]: sshd@4-139.178.70.108:22-139.178.89.65:40016.service: Deactivated successfully. Feb 9 19:50:54.405274 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:50:54.406356 systemd-logind[1145]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:50:54.407419 systemd[1]: Started sshd@5-139.178.70.108:22-139.178.89.65:40032.service. Feb 9 19:50:54.408551 systemd-logind[1145]: Removed session 7. Feb 9 19:50:54.438080 sshd[1323]: Accepted publickey for core from 139.178.89.65 port 40032 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:54.439261 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:54.443144 systemd[1]: Started session-8.scope. Feb 9 19:50:54.443585 systemd-logind[1145]: New session 8 of user core. Feb 9 19:50:54.494756 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:50:54.496113 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:50:54.498169 sudo[1327]: pam_unix(sudo:session): session closed for user root Feb 9 19:50:54.501768 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:50:54.501913 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:50:54.509688 systemd[1]: Stopping audit-rules.service... Feb 9 19:50:54.509000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:50:54.511503 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 19:50:54.511543 kernel: audit: type=1305 audit(1707508254.509:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:50:54.511648 auditctl[1330]: No rules Feb 9 19:50:54.513441 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:50:54.513567 systemd[1]: Stopped audit-rules.service. Feb 9 19:50:54.518900 kernel: audit: type=1300 audit(1707508254.509:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd285ddb0 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:54.509000 audit[1330]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd285ddb0 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:54.509000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:50:54.514769 systemd[1]: Starting audit-rules.service... Feb 9 19:50:54.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.522994 kernel: audit: type=1327 audit(1707508254.509:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:50:54.523040 kernel: audit: type=1131 audit(1707508254.512:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.528318 augenrules[1347]: No rules Feb 9 19:50:54.528914 systemd[1]: Finished audit-rules.service. Feb 9 19:50:54.529524 sudo[1326]: pam_unix(sudo:session): session closed for user root Feb 9 19:50:54.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.532911 kernel: audit: type=1130 audit(1707508254.528:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.533327 sshd[1323]: pam_unix(sshd:session): session closed for user core Feb 9 19:50:54.528000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.535569 systemd[1]: Started sshd@6-139.178.70.108:22-139.178.89.65:40034.service. Feb 9 19:50:54.538963 kernel: audit: type=1106 audit(1707508254.528:176): pid=1326 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.528000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.540193 systemd[1]: sshd@5-139.178.70.108:22-139.178.89.65:40032.service: Deactivated successfully. Feb 9 19:50:54.540587 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:50:54.543967 kernel: audit: type=1104 audit(1707508254.528:177): pid=1326 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.544125 systemd-logind[1145]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:50:54.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-139.178.89.65:40034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.538000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.548295 systemd-logind[1145]: Removed session 8. Feb 9 19:50:54.551644 kernel: audit: type=1130 audit(1707508254.534:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-139.178.89.65:40034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.551684 kernel: audit: type=1106 audit(1707508254.538:179): pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.551699 kernel: audit: type=1104 audit(1707508254.538:180): pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.538000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.108:22-139.178.89.65:40032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.570000 audit[1352]: USER_ACCT pid=1352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.572191 sshd[1352]: Accepted publickey for core from 139.178.89.65 port 40034 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:50:54.571000 audit[1352]: CRED_ACQ pid=1352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.571000 audit[1352]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff769f7b30 a2=3 a3=0 items=0 ppid=1 pid=1352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:54.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:50:54.572488 sshd[1352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:50:54.574874 systemd-logind[1145]: New session 9 of user core. Feb 9 19:50:54.575388 systemd[1]: Started session-9.scope. Feb 9 19:50:54.577000 audit[1352]: USER_START pid=1352 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.578000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:50:54.625866 sudo[1356]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:50:54.626015 sudo[1356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:50:54.624000 audit[1356]: USER_ACCT pid=1356 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.625000 audit[1356]: CRED_REFR pid=1356 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:54.626000 audit[1356]: USER_START pid=1356 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:50:55.164270 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:50:55.168770 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:50:55.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:55.169050 systemd[1]: Reached target network-online.target. Feb 9 19:50:55.170358 systemd[1]: Starting docker.service... Feb 9 19:50:55.196766 env[1372]: time="2024-02-09T19:50:55.196723422Z" level=info msg="Starting up" Feb 9 19:50:55.197706 env[1372]: time="2024-02-09T19:50:55.197691216Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:50:55.197768 env[1372]: time="2024-02-09T19:50:55.197756746Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:50:55.197820 env[1372]: time="2024-02-09T19:50:55.197808122Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:50:55.197870 env[1372]: time="2024-02-09T19:50:55.197857049Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:50:55.199202 env[1372]: time="2024-02-09T19:50:55.199161144Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:50:55.199202 env[1372]: time="2024-02-09T19:50:55.199183731Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:50:55.199308 env[1372]: time="2024-02-09T19:50:55.199205099Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:50:55.199308 env[1372]: time="2024-02-09T19:50:55.199210804Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:50:55.204247 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3452797988-merged.mount: Deactivated successfully. Feb 9 19:50:55.234576 env[1372]: time="2024-02-09T19:50:55.234551966Z" level=info msg="Loading containers: start." Feb 9 19:50:55.316000 audit[1403]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.316000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdc12b2250 a2=0 a3=7ffdc12b223c items=0 ppid=1372 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:50:55.318000 audit[1405]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.318000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe45ba7ac0 a2=0 a3=7ffe45ba7aac items=0 ppid=1372 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:50:55.319000 audit[1407]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.319000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc764f59c0 a2=0 a3=7ffc764f59ac items=0 ppid=1372 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:50:55.321000 audit[1409]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.321000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffc748b910 a2=0 a3=7fffc748b8fc items=0 ppid=1372 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:50:55.323000 audit[1411]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.323000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc081af430 a2=0 a3=7ffc081af41c items=0 ppid=1372 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.323000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:50:55.336000 audit[1416]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.336000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6b3f4160 a2=0 a3=7ffe6b3f414c items=0 ppid=1372 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:50:55.340000 audit[1418]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.340000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc70b6cbf0 a2=0 a3=7ffc70b6cbdc items=0 ppid=1372 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:50:55.341000 audit[1420]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.341000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff4610dac0 a2=0 a3=7fff4610daac items=0 ppid=1372 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:50:55.342000 audit[1422]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.342000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff8fe1f3c0 a2=0 a3=7fff8fe1f3ac items=0 ppid=1372 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:50:55.346000 audit[1426]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.346000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffde3d31040 a2=0 a3=7ffde3d3102c items=0 ppid=1372 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:50:55.347000 audit[1427]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.347000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd1dd56440 a2=0 a3=7ffd1dd5642c items=0 ppid=1372 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:50:55.355897 kernel: Initializing XFRM netlink socket Feb 9 19:50:55.382791 env[1372]: time="2024-02-09T19:50:55.382765972Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:50:55.398000 audit[1435]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.398000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcff7cdea0 a2=0 a3=7ffcff7cde8c items=0 ppid=1372 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:50:55.407000 audit[1438]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.407000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcf7289c00 a2=0 a3=7ffcf7289bec items=0 ppid=1372 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.407000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:50:55.409000 audit[1441]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.409000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffea10a16d0 a2=0 a3=7ffea10a16bc items=0 ppid=1372 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.409000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:50:55.410000 audit[1443]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.410000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe26748e40 a2=0 a3=7ffe26748e2c items=0 ppid=1372 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.410000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:50:55.412000 audit[1445]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.412000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcaa45e150 a2=0 a3=7ffcaa45e13c items=0 ppid=1372 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.412000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:50:55.413000 audit[1447]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.413000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe3ebb7970 a2=0 a3=7ffe3ebb795c items=0 ppid=1372 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.413000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:50:55.416000 audit[1449]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.416000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd9efc4070 a2=0 a3=7ffd9efc405c items=0 ppid=1372 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:50:55.422000 audit[1452]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.422000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc3ae03a60 a2=0 a3=7ffc3ae03a4c items=0 ppid=1372 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.422000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:50:55.424000 audit[1454]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.424000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff7ac1a5e0 a2=0 a3=7fff7ac1a5cc items=0 ppid=1372 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:50:55.425000 audit[1456]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.425000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe9cfa65d0 a2=0 a3=7ffe9cfa65bc items=0 ppid=1372 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:50:55.427000 audit[1458]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.427000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd06195e40 a2=0 a3=7ffd06195e2c items=0 ppid=1372 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:50:55.428422 systemd-networkd[1065]: docker0: Link UP Feb 9 19:50:55.431000 audit[1462]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.431000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffceeff3b0 a2=0 a3=7fffceeff39c items=0 ppid=1372 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:50:55.432000 audit[1463]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:50:55.432000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec8bf0800 a2=0 a3=7ffec8bf07ec items=0 ppid=1372 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:50:55.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:50:55.433593 env[1372]: time="2024-02-09T19:50:55.433569960Z" level=info msg="Loading containers: done." Feb 9 19:50:55.442721 env[1372]: time="2024-02-09T19:50:55.442697549Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:50:55.442954 env[1372]: time="2024-02-09T19:50:55.442943267Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:50:55.443066 env[1372]: time="2024-02-09T19:50:55.443056726Z" level=info msg="Daemon has completed initialization" Feb 9 19:50:55.451954 systemd[1]: Started docker.service. Feb 9 19:50:55.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:55.454839 env[1372]: time="2024-02-09T19:50:55.454804456Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:50:55.465947 systemd[1]: Reloading. Feb 9 19:50:55.515785 /usr/lib/systemd/system-generators/torcx-generator[1509]: time="2024-02-09T19:50:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:50:55.515808 /usr/lib/systemd/system-generators/torcx-generator[1509]: time="2024-02-09T19:50:55Z" level=info msg="torcx already run" Feb 9 19:50:55.575292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:50:55.575308 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:50:55.588033 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit: BPF prog-id=37 op=LOAD Feb 9 19:50:55.622000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit: BPF prog-id=38 op=LOAD Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.622000 audit: BPF prog-id=39 op=LOAD Feb 9 19:50:55.622000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:50:55.622000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit: BPF prog-id=40 op=LOAD Feb 9 19:50:55.623000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit: BPF prog-id=41 op=LOAD Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.623000 audit: BPF prog-id=42 op=LOAD Feb 9 19:50:55.623000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:50:55.623000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit: BPF prog-id=43 op=LOAD Feb 9 19:50:55.624000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.624000 audit: BPF prog-id=44 op=LOAD Feb 9 19:50:55.624000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit: BPF prog-id=45 op=LOAD Feb 9 19:50:55.626000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit: BPF prog-id=46 op=LOAD Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.626000 audit: BPF prog-id=47 op=LOAD Feb 9 19:50:55.626000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:50:55.626000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit: BPF prog-id=48 op=LOAD Feb 9 19:50:55.627000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit: BPF prog-id=49 op=LOAD Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit: BPF prog-id=50 op=LOAD Feb 9 19:50:55.627000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:50:55.627000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:50:55.628000 audit: BPF prog-id=51 op=LOAD Feb 9 19:50:55.628000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:50:55.633167 systemd[1]: Started kubelet.service. Feb 9 19:50:55.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:50:55.664416 kubelet[1568]: E0209 19:50:55.664376 1568 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:50:55.665913 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:50:55.665984 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:50:55.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:50:57.007949 env[1176]: time="2024-02-09T19:50:57.007787509Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 19:50:57.882458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3407401875.mount: Deactivated successfully. Feb 9 19:50:59.286972 update_engine[1146]: I0209 19:50:59.286939 1146 update_attempter.cc:509] Updating boot flags... Feb 9 19:50:59.589858 env[1176]: time="2024-02-09T19:50:59.589825615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:50:59.590758 env[1176]: time="2024-02-09T19:50:59.590740781Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:50:59.591727 env[1176]: time="2024-02-09T19:50:59.591711882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:50:59.592682 env[1176]: time="2024-02-09T19:50:59.592667378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:50:59.593162 env[1176]: time="2024-02-09T19:50:59.593138262Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 9 19:50:59.599144 env[1176]: time="2024-02-09T19:50:59.599104510Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 19:51:01.232627 env[1176]: time="2024-02-09T19:51:01.232600798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:01.233391 env[1176]: time="2024-02-09T19:51:01.233374946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:01.234292 env[1176]: time="2024-02-09T19:51:01.234280790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:01.235161 env[1176]: time="2024-02-09T19:51:01.235146070Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:01.235598 env[1176]: time="2024-02-09T19:51:01.235582509Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 9 19:51:01.241834 env[1176]: time="2024-02-09T19:51:01.241818690Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 19:51:02.558451 env[1176]: time="2024-02-09T19:51:02.558418020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:02.559215 env[1176]: time="2024-02-09T19:51:02.559198827Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:02.560173 env[1176]: time="2024-02-09T19:51:02.560160288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:02.561163 env[1176]: time="2024-02-09T19:51:02.561149173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:02.561720 env[1176]: time="2024-02-09T19:51:02.561705776Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 9 19:51:02.567479 env[1176]: time="2024-02-09T19:51:02.567458114Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 19:51:03.384042 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2345360476.mount: Deactivated successfully. Feb 9 19:51:03.973685 env[1176]: time="2024-02-09T19:51:03.973647539Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:03.985146 env[1176]: time="2024-02-09T19:51:03.985114569Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:03.989770 env[1176]: time="2024-02-09T19:51:03.989741146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:03.997716 env[1176]: time="2024-02-09T19:51:03.997693099Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:03.997901 env[1176]: time="2024-02-09T19:51:03.997855828Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 19:51:04.006173 env[1176]: time="2024-02-09T19:51:04.006151411Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:51:04.585292 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount714080465.mount: Deactivated successfully. Feb 9 19:51:04.587701 env[1176]: time="2024-02-09T19:51:04.587671197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:04.589207 env[1176]: time="2024-02-09T19:51:04.589182078Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:04.589861 env[1176]: time="2024-02-09T19:51:04.589849709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:04.590714 env[1176]: time="2024-02-09T19:51:04.590701813Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:04.590903 env[1176]: time="2024-02-09T19:51:04.590888867Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:51:04.596770 env[1176]: time="2024-02-09T19:51:04.596742105Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 19:51:05.125981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount629974664.mount: Deactivated successfully. Feb 9 19:51:05.832428 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:51:05.832590 systemd[1]: Stopped kubelet.service. Feb 9 19:51:05.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:05.833898 systemd[1]: Started kubelet.service. Feb 9 19:51:05.837425 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 19:51:05.837495 kernel: audit: type=1130 audit(1707508265.831:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:05.837515 kernel: audit: type=1131 audit(1707508265.831:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:05.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:05.840150 kernel: audit: type=1130 audit(1707508265.833:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:05.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:05.885468 kubelet[1630]: E0209 19:51:05.885444 1630 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:51:05.887695 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:51:05.887774 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:51:05.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:51:05.890894 kernel: audit: type=1131 audit(1707508265.887:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:51:08.678648 env[1176]: time="2024-02-09T19:51:08.678609587Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:08.679400 env[1176]: time="2024-02-09T19:51:08.679379423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:08.680557 env[1176]: time="2024-02-09T19:51:08.680540615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:08.681703 env[1176]: time="2024-02-09T19:51:08.681687192Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:08.682270 env[1176]: time="2024-02-09T19:51:08.682254342Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 9 19:51:08.691312 env[1176]: time="2024-02-09T19:51:08.691291111Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:51:09.354371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3751814879.mount: Deactivated successfully. Feb 9 19:51:10.407039 env[1176]: time="2024-02-09T19:51:10.406946188Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:10.417233 env[1176]: time="2024-02-09T19:51:10.416713162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:10.423020 env[1176]: time="2024-02-09T19:51:10.422994524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:10.430498 env[1176]: time="2024-02-09T19:51:10.430471804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:10.430734 env[1176]: time="2024-02-09T19:51:10.430714196Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 19:51:12.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:12.417957 systemd[1]: Stopped kubelet.service. Feb 9 19:51:12.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:12.423731 kernel: audit: type=1130 audit(1707508272.417:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:12.423780 kernel: audit: type=1131 audit(1707508272.417:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:12.432796 systemd[1]: Reloading. Feb 9 19:51:12.492638 /usr/lib/systemd/system-generators/torcx-generator[1723]: time="2024-02-09T19:51:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:51:12.492655 /usr/lib/systemd/system-generators/torcx-generator[1723]: time="2024-02-09T19:51:12Z" level=info msg="torcx already run" Feb 9 19:51:12.550403 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:51:12.550432 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:51:12.563102 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609633 kernel: audit: type=1400 audit(1707508272.601:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609670 kernel: audit: type=1400 audit(1707508272.601:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609688 kernel: audit: type=1400 audit(1707508272.601:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.612088 kernel: audit: type=1400 audit(1707508272.601:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.614516 kernel: audit: type=1400 audit(1707508272.601:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.616950 kernel: audit: type=1400 audit(1707508272.601:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.616976 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619937 kernel: audit: type=1400 audit(1707508272.601:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit: BPF prog-id=52 op=LOAD Feb 9 19:51:12.604000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit: BPF prog-id=53 op=LOAD Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.608000 audit: BPF prog-id=54 op=LOAD Feb 9 19:51:12.608000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:51:12.608000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit: BPF prog-id=55 op=LOAD Feb 9 19:51:12.611000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit: BPF prog-id=56 op=LOAD Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.613000 audit: BPF prog-id=57 op=LOAD Feb 9 19:51:12.613000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:51:12.613000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:51:12.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.619000 audit: BPF prog-id=59 op=LOAD Feb 9 19:51:12.619000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.620000 audit: BPF prog-id=60 op=LOAD Feb 9 19:51:12.620000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit: BPF prog-id=61 op=LOAD Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit: BPF prog-id=62 op=LOAD Feb 9 19:51:12.621000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:51:12.621000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.621000 audit: BPF prog-id=63 op=LOAD Feb 9 19:51:12.621000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:51:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit: BPF prog-id=64 op=LOAD Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit: BPF prog-id=65 op=LOAD Feb 9 19:51:12.622000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:51:12.622000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:12.622000 audit: BPF prog-id=66 op=LOAD Feb 9 19:51:12.622000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:51:12.635137 systemd[1]: Started kubelet.service. Feb 9 19:51:12.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:12.666365 kubelet[1783]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:51:12.666603 kubelet[1783]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:51:12.666649 kubelet[1783]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:51:12.666731 kubelet[1783]: I0209 19:51:12.666709 1783 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:51:13.123885 kubelet[1783]: I0209 19:51:13.123852 1783 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:51:13.123885 kubelet[1783]: I0209 19:51:13.123871 1783 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:51:13.124047 kubelet[1783]: I0209 19:51:13.124035 1783 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:51:13.135255 kubelet[1783]: I0209 19:51:13.135236 1783 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:51:13.136471 kubelet[1783]: E0209 19:51:13.136462 1783 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.108:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.142245 kubelet[1783]: I0209 19:51:13.142230 1783 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:51:13.142387 kubelet[1783]: I0209 19:51:13.142369 1783 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:51:13.142502 kubelet[1783]: I0209 19:51:13.142486 1783 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:51:13.142587 kubelet[1783]: I0209 19:51:13.142504 1783 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:51:13.142587 kubelet[1783]: I0209 19:51:13.142514 1783 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:51:13.142964 kubelet[1783]: I0209 19:51:13.142953 1783 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:51:13.144363 kubelet[1783]: I0209 19:51:13.144352 1783 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:51:13.144398 kubelet[1783]: I0209 19:51:13.144367 1783 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:51:13.144398 kubelet[1783]: I0209 19:51:13.144388 1783 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:51:13.144458 kubelet[1783]: I0209 19:51:13.144407 1783 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:51:13.145509 kubelet[1783]: W0209 19:51:13.145372 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.145509 kubelet[1783]: E0209 19:51:13.145407 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.145509 kubelet[1783]: W0209 19:51:13.145441 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.145509 kubelet[1783]: E0209 19:51:13.145466 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.145618 kubelet[1783]: I0209 19:51:13.145553 1783 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:51:13.146288 kubelet[1783]: W0209 19:51:13.146276 1783 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:51:13.147991 kubelet[1783]: I0209 19:51:13.147978 1783 server.go:1232] "Started kubelet" Feb 9 19:51:13.151000 audit[1783]: AVC avc: denied { mac_admin } for pid=1783 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:13.151000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:51:13.151000 audit[1783]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d24540 a1=c0008394e8 a2=c000d24510 a3=25 items=0 ppid=1 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.151000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:51:13.151000 audit[1783]: AVC avc: denied { mac_admin } for pid=1783 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:13.151000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:51:13.151000 audit[1783]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000835a40 a1=c000839500 a2=c000d245d0 a3=25 items=0 ppid=1 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.151000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:51:13.152542 kubelet[1783]: I0209 19:51:13.152258 1783 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:51:13.152542 kubelet[1783]: I0209 19:51:13.152283 1783 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:51:13.152542 kubelet[1783]: I0209 19:51:13.152318 1783 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:51:13.153093 kubelet[1783]: E0209 19:51:13.153084 1783 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:51:13.153156 kubelet[1783]: E0209 19:51:13.153148 1783 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:51:13.153834 kubelet[1783]: E0209 19:51:13.153790 1783 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b249ba48067528", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 51, 13, 147966760, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 51, 13, 147966760, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://139.178.70.108:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.108:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:51:13.153000 audit[1794]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.153000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff08ef630 a2=0 a3=7ffff08ef61c items=0 ppid=1783 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:51:13.156984 kubelet[1783]: I0209 19:51:13.156974 1783 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:51:13.157471 kubelet[1783]: I0209 19:51:13.157463 1783 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:51:13.157851 kubelet[1783]: I0209 19:51:13.157837 1783 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:51:13.158857 kubelet[1783]: I0209 19:51:13.158843 1783 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:51:13.158944 kubelet[1783]: I0209 19:51:13.158933 1783 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:51:13.159000 audit[1795]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.159000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9f807e20 a2=0 a3=7ffd9f807e0c items=0 ppid=1783 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:51:13.160814 kubelet[1783]: I0209 19:51:13.160803 1783 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:51:13.160978 kubelet[1783]: I0209 19:51:13.160971 1783 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:51:13.161497 kubelet[1783]: W0209 19:51:13.161218 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.161497 kubelet[1783]: E0209 19:51:13.161246 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.161497 kubelet[1783]: E0209 19:51:13.161292 1783 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="200ms" Feb 9 19:51:13.160000 audit[1797]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.160000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4fc1f330 a2=0 a3=7ffd4fc1f31c items=0 ppid=1783 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:51:13.162000 audit[1799]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.162000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0786a7a0 a2=0 a3=7ffd0786a78c items=0 ppid=1783 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:51:13.166000 audit[1802]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.166000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff184dfce0 a2=0 a3=7fff184dfccc items=0 ppid=1783 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:51:13.167992 kubelet[1783]: I0209 19:51:13.167974 1783 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:51:13.167000 audit[1803]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:13.167000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe848fe980 a2=0 a3=7ffe848fe96c items=0 ppid=1783 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:51:13.168909 kubelet[1783]: I0209 19:51:13.168810 1783 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:51:13.168000 audit[1804]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.168000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc549ca3d0 a2=0 a3=7ffc549ca3bc items=0 ppid=1783 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:51:13.170011 kubelet[1783]: I0209 19:51:13.169265 1783 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:51:13.170011 kubelet[1783]: I0209 19:51:13.169281 1783 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:51:13.170011 kubelet[1783]: E0209 19:51:13.169307 1783 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:51:13.169000 audit[1805]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.169000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd77144510 a2=0 a3=7ffd771444fc items=0 ppid=1783 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:51:13.170000 audit[1807]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:13.170000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd55f46e30 a2=0 a3=7ffd55f46e1c items=0 ppid=1783 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:51:13.170000 audit[1808]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:13.170000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1d700cd0 a2=0 a3=7ffd1d700cbc items=0 ppid=1783 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:51:13.171000 audit[1809]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:13.171000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff20dca690 a2=0 a3=7fff20dca67c items=0 ppid=1783 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:51:13.171000 audit[1810]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:13.171000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1dd2a610 a2=0 a3=7fff1dd2a5fc items=0 ppid=1783 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:51:13.172971 kubelet[1783]: W0209 19:51:13.172826 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.172971 kubelet[1783]: E0209 19:51:13.172855 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:13.190048 kubelet[1783]: I0209 19:51:13.190021 1783 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:51:13.190048 kubelet[1783]: I0209 19:51:13.190038 1783 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:51:13.190048 kubelet[1783]: I0209 19:51:13.190049 1783 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:51:13.190825 kubelet[1783]: I0209 19:51:13.190814 1783 policy_none.go:49] "None policy: Start" Feb 9 19:51:13.191176 kubelet[1783]: I0209 19:51:13.191165 1783 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:51:13.191208 kubelet[1783]: I0209 19:51:13.191180 1783 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:51:13.194210 systemd[1]: Created slice kubepods.slice. Feb 9 19:51:13.196834 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:51:13.198795 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:51:13.203336 kubelet[1783]: I0209 19:51:13.203325 1783 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:51:13.202000 audit[1783]: AVC avc: denied { mac_admin } for pid=1783 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:13.202000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:51:13.202000 audit[1783]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f091d0 a1=c000f2a8e8 a2=c000f091a0 a3=25 items=0 ppid=1 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:13.202000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:51:13.203767 kubelet[1783]: I0209 19:51:13.203760 1783 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:51:13.203936 kubelet[1783]: I0209 19:51:13.203929 1783 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:51:13.206435 kubelet[1783]: E0209 19:51:13.206422 1783 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 9 19:51:13.259695 kubelet[1783]: I0209 19:51:13.259670 1783 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:51:13.260013 kubelet[1783]: E0209 19:51:13.260003 1783 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Feb 9 19:51:13.270379 kubelet[1783]: I0209 19:51:13.270364 1783 topology_manager.go:215] "Topology Admit Handler" podUID="0e66fee94da48878606e7250600f35e2" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 9 19:51:13.271140 kubelet[1783]: I0209 19:51:13.271128 1783 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 9 19:51:13.272061 kubelet[1783]: I0209 19:51:13.272050 1783 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 9 19:51:13.275953 systemd[1]: Created slice kubepods-burstable-pod0e66fee94da48878606e7250600f35e2.slice. Feb 9 19:51:13.293098 systemd[1]: Created slice kubepods-burstable-pod212dcc5e2f08bec92c239ac5786b7e2b.slice. Feb 9 19:51:13.300289 systemd[1]: Created slice kubepods-burstable-podd0325d16aab19669b5fea4b6623890e6.slice. Feb 9 19:51:13.360101 kubelet[1783]: I0209 19:51:13.360081 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e66fee94da48878606e7250600f35e2-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0e66fee94da48878606e7250600f35e2\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:51:13.360228 kubelet[1783]: I0209 19:51:13.360218 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 9 19:51:13.360321 kubelet[1783]: I0209 19:51:13.360311 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e66fee94da48878606e7250600f35e2-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0e66fee94da48878606e7250600f35e2\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:51:13.360406 kubelet[1783]: I0209 19:51:13.360394 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:13.360503 kubelet[1783]: I0209 19:51:13.360494 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:13.360598 kubelet[1783]: I0209 19:51:13.360589 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:13.360701 kubelet[1783]: I0209 19:51:13.360690 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:13.360783 kubelet[1783]: I0209 19:51:13.360774 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:13.360867 kubelet[1783]: I0209 19:51:13.360858 1783 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e66fee94da48878606e7250600f35e2-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0e66fee94da48878606e7250600f35e2\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:51:13.362314 kubelet[1783]: E0209 19:51:13.362295 1783 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="400ms" Feb 9 19:51:13.461908 kubelet[1783]: I0209 19:51:13.461314 1783 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:51:13.461908 kubelet[1783]: E0209 19:51:13.461485 1783 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Feb 9 19:51:13.593516 env[1176]: time="2024-02-09T19:51:13.593229490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0e66fee94da48878606e7250600f35e2,Namespace:kube-system,Attempt:0,}" Feb 9 19:51:13.595473 env[1176]: time="2024-02-09T19:51:13.595237864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,}" Feb 9 19:51:13.603468 env[1176]: time="2024-02-09T19:51:13.603220566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,}" Feb 9 19:51:13.762874 kubelet[1783]: E0209 19:51:13.762812 1783 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="800ms" Feb 9 19:51:13.862913 kubelet[1783]: I0209 19:51:13.862871 1783 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:51:13.863106 kubelet[1783]: E0209 19:51:13.863094 1783 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Feb 9 19:51:14.135081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2610698087.mount: Deactivated successfully. Feb 9 19:51:14.135547 env[1176]: time="2024-02-09T19:51:14.135120809Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.136023 env[1176]: time="2024-02-09T19:51:14.136006694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.136589 env[1176]: time="2024-02-09T19:51:14.136575854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.137421 env[1176]: time="2024-02-09T19:51:14.137408023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.138009 env[1176]: time="2024-02-09T19:51:14.137997629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.138439 env[1176]: time="2024-02-09T19:51:14.138427803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.140290 env[1176]: time="2024-02-09T19:51:14.140276488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.142146 env[1176]: time="2024-02-09T19:51:14.142133938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.142766 env[1176]: time="2024-02-09T19:51:14.142751338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.144148 env[1176]: time="2024-02-09T19:51:14.144136506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.144662 env[1176]: time="2024-02-09T19:51:14.144649748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.148425 env[1176]: time="2024-02-09T19:51:14.148403761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:14.161397 env[1176]: time="2024-02-09T19:51:14.152934899Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:14.161397 env[1176]: time="2024-02-09T19:51:14.152957638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:14.161397 env[1176]: time="2024-02-09T19:51:14.152966127Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:14.161397 env[1176]: time="2024-02-09T19:51:14.153050053Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff3cd0a7b6d59124ad9024066d36eee14a2a8edff8283ce6c8d6e029b2454e38 pid=1821 runtime=io.containerd.runc.v2 Feb 9 19:51:14.165500 env[1176]: time="2024-02-09T19:51:14.160244544Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:14.165500 env[1176]: time="2024-02-09T19:51:14.160264411Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:14.165500 env[1176]: time="2024-02-09T19:51:14.160285786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:14.165500 env[1176]: time="2024-02-09T19:51:14.160359022Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df79905a9cbc09d2f33de10b4586f46324cf6b0885aab1f7ad6a4342af299875 pid=1839 runtime=io.containerd.runc.v2 Feb 9 19:51:14.170159 env[1176]: time="2024-02-09T19:51:14.170123547Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:14.170236 env[1176]: time="2024-02-09T19:51:14.170161692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:14.170236 env[1176]: time="2024-02-09T19:51:14.170175915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:14.170332 env[1176]: time="2024-02-09T19:51:14.170255181Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3427707980a33408be5210b0549d2e0d6f780631d52737832af4428904662da8 pid=1863 runtime=io.containerd.runc.v2 Feb 9 19:51:14.176289 systemd[1]: Started cri-containerd-df79905a9cbc09d2f33de10b4586f46324cf6b0885aab1f7ad6a4342af299875.scope. Feb 9 19:51:14.184858 systemd[1]: Started cri-containerd-ff3cd0a7b6d59124ad9024066d36eee14a2a8edff8283ce6c8d6e029b2454e38.scope. Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.188000 audit: BPF prog-id=67 op=LOAD Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1839 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373939303561396362633039643266333364653130623435383666 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1839 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373939303561396362633039643266333364653130623435383666 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.189000 audit: BPF prog-id=68 op=LOAD Feb 9 19:51:14.189000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8400 items=0 ppid=1839 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373939303561396362633039643266333364653130623435383666 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit: BPF prog-id=69 op=LOAD Feb 9 19:51:14.190000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8448 items=0 ppid=1839 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373939303561396362633039643266333364653130623435383666 Feb 9 19:51:14.190000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:51:14.190000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.190000 audit: BPF prog-id=70 op=LOAD Feb 9 19:51:14.190000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8858 items=0 ppid=1839 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373939303561396362633039643266333364653130623435383666 Feb 9 19:51:14.194843 systemd[1]: Started cri-containerd-3427707980a33408be5210b0549d2e0d6f780631d52737832af4428904662da8.scope. Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.205000 audit: BPF prog-id=71 op=LOAD Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1863 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323737303739383061333334303862653532313062303534396432 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1863 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323737303739383061333334303862653532313062303534396432 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.206000 audit: BPF prog-id=72 op=LOAD Feb 9 19:51:14.206000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024370 items=0 ppid=1863 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323737303739383061333334303862653532313062303534396432 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit: BPF prog-id=73 op=LOAD Feb 9 19:51:14.207000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243b8 items=0 ppid=1863 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323737303739383061333334303862653532313062303534396432 Feb 9 19:51:14.207000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:51:14.207000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.208000 audit: BPF prog-id=74 op=LOAD Feb 9 19:51:14.209000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.209000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1821 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336364306137623664353931323461643930323430363664333665 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1821 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336364306137623664353931323461643930323430363664333665 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit: BPF prog-id=75 op=LOAD Feb 9 19:51:14.210000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000213d20 items=0 ppid=1821 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336364306137623664353931323461643930323430363664333665 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.210000 audit: BPF prog-id=76 op=LOAD Feb 9 19:51:14.210000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000213d68 items=0 ppid=1821 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336364306137623664353931323461643930323430363664333665 Feb 9 19:51:14.211000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:51:14.211000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.211000 audit: BPF prog-id=77 op=LOAD Feb 9 19:51:14.207000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.207000 audit: BPF prog-id=78 op=LOAD Feb 9 19:51:14.207000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247c8 items=0 ppid=1863 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323737303739383061333334303862653532313062303534396432 Feb 9 19:51:14.211000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000400178 items=0 ppid=1821 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666336364306137623664353931323461643930323430363664333665 Feb 9 19:51:14.223300 env[1176]: time="2024-02-09T19:51:14.223276070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:0e66fee94da48878606e7250600f35e2,Namespace:kube-system,Attempt:0,} returns sandbox id \"df79905a9cbc09d2f33de10b4586f46324cf6b0885aab1f7ad6a4342af299875\"" Feb 9 19:51:14.225238 env[1176]: time="2024-02-09T19:51:14.225222717Z" level=info msg="CreateContainer within sandbox \"df79905a9cbc09d2f33de10b4586f46324cf6b0885aab1f7ad6a4342af299875\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:51:14.236403 env[1176]: time="2024-02-09T19:51:14.236376764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,} returns sandbox id \"ff3cd0a7b6d59124ad9024066d36eee14a2a8edff8283ce6c8d6e029b2454e38\"" Feb 9 19:51:14.237533 env[1176]: time="2024-02-09T19:51:14.237517744Z" level=info msg="CreateContainer within sandbox \"ff3cd0a7b6d59124ad9024066d36eee14a2a8edff8283ce6c8d6e029b2454e38\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:51:14.247589 env[1176]: time="2024-02-09T19:51:14.247563267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"3427707980a33408be5210b0549d2e0d6f780631d52737832af4428904662da8\"" Feb 9 19:51:14.249105 env[1176]: time="2024-02-09T19:51:14.249086199Z" level=info msg="CreateContainer within sandbox \"3427707980a33408be5210b0549d2e0d6f780631d52737832af4428904662da8\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:51:14.278923 env[1176]: time="2024-02-09T19:51:14.278895643Z" level=info msg="CreateContainer within sandbox \"df79905a9cbc09d2f33de10b4586f46324cf6b0885aab1f7ad6a4342af299875\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6cc7d75084103ae231a1f9e5abd40938dfc564b4ff5af8971b15c3a4d933ff49\"" Feb 9 19:51:14.280358 env[1176]: time="2024-02-09T19:51:14.280339793Z" level=info msg="CreateContainer within sandbox \"ff3cd0a7b6d59124ad9024066d36eee14a2a8edff8283ce6c8d6e029b2454e38\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3dfc0bfe60c43e3c818367b6664dcc2bd3a1fd62c772e68cfc8b8a4424c98dbc\"" Feb 9 19:51:14.280779 env[1176]: time="2024-02-09T19:51:14.280718417Z" level=info msg="StartContainer for \"6cc7d75084103ae231a1f9e5abd40938dfc564b4ff5af8971b15c3a4d933ff49\"" Feb 9 19:51:14.284793 env[1176]: time="2024-02-09T19:51:14.284773873Z" level=info msg="CreateContainer within sandbox \"3427707980a33408be5210b0549d2e0d6f780631d52737832af4428904662da8\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c87489e677b0e571b03882ece96a33791f87997f7eb2c3172ca5b4ec4d20826c\"" Feb 9 19:51:14.285144 env[1176]: time="2024-02-09T19:51:14.285131390Z" level=info msg="StartContainer for \"c87489e677b0e571b03882ece96a33791f87997f7eb2c3172ca5b4ec4d20826c\"" Feb 9 19:51:14.286310 env[1176]: time="2024-02-09T19:51:14.286288772Z" level=info msg="StartContainer for \"3dfc0bfe60c43e3c818367b6664dcc2bd3a1fd62c772e68cfc8b8a4424c98dbc\"" Feb 9 19:51:14.295566 systemd[1]: Started cri-containerd-6cc7d75084103ae231a1f9e5abd40938dfc564b4ff5af8971b15c3a4d933ff49.scope. Feb 9 19:51:14.303156 systemd[1]: Started cri-containerd-3dfc0bfe60c43e3c818367b6664dcc2bd3a1fd62c772e68cfc8b8a4424c98dbc.scope. Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.308000 audit: BPF prog-id=79 op=LOAD Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1839 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633764373530383431303361653233316131663965356162643430 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1839 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633764373530383431303361653233316131663965356162643430 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit: BPF prog-id=80 op=LOAD Feb 9 19:51:14.309000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000358260 items=0 ppid=1839 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633764373530383431303361653233316131663965356162643430 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit: BPF prog-id=81 op=LOAD Feb 9 19:51:14.309000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003582a8 items=0 ppid=1839 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633764373530383431303361653233316131663965356162643430 Feb 9 19:51:14.309000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:51:14.309000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.309000 audit: BPF prog-id=82 op=LOAD Feb 9 19:51:14.309000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003586b8 items=0 ppid=1839 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633764373530383431303361653233316131663965356162643430 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.313000 audit: BPF prog-id=83 op=LOAD Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1821 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666330626665363063343365336338313833363762363636346463 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1821 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666330626665363063343365336338313833363762363636346463 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit: BPF prog-id=84 op=LOAD Feb 9 19:51:14.317000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00037ea90 items=0 ppid=1821 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666330626665363063343365336338313833363762363636346463 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit: BPF prog-id=85 op=LOAD Feb 9 19:51:14.317000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00037ead8 items=0 ppid=1821 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666330626665363063343365336338313833363762363636346463 Feb 9 19:51:14.317000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:51:14.317000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.317000 audit: BPF prog-id=86 op=LOAD Feb 9 19:51:14.317000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00037eee8 items=0 ppid=1821 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364666330626665363063343365336338313833363762363636346463 Feb 9 19:51:14.324160 systemd[1]: Started cri-containerd-c87489e677b0e571b03882ece96a33791f87997f7eb2c3172ca5b4ec4d20826c.scope. Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.337000 audit: BPF prog-id=87 op=LOAD Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1863 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373438396536373762306535373162303338383265636539366133 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1863 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373438396536373762306535373162303338383265636539366133 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit: BPF prog-id=88 op=LOAD Feb 9 19:51:14.338000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b6400 items=0 ppid=1863 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373438396536373762306535373162303338383265636539366133 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit: BPF prog-id=89 op=LOAD Feb 9 19:51:14.338000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b6448 items=0 ppid=1863 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373438396536373762306535373162303338383265636539366133 Feb 9 19:51:14.338000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:51:14.338000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:14.338000 audit: BPF prog-id=90 op=LOAD Feb 9 19:51:14.338000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6858 items=0 ppid=1863 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:14.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373438396536373762306535373162303338383265636539366133 Feb 9 19:51:14.350990 env[1176]: time="2024-02-09T19:51:14.350954586Z" level=info msg="StartContainer for \"6cc7d75084103ae231a1f9e5abd40938dfc564b4ff5af8971b15c3a4d933ff49\" returns successfully" Feb 9 19:51:14.364104 env[1176]: time="2024-02-09T19:51:14.364078200Z" level=info msg="StartContainer for \"3dfc0bfe60c43e3c818367b6664dcc2bd3a1fd62c772e68cfc8b8a4424c98dbc\" returns successfully" Feb 9 19:51:14.373562 env[1176]: time="2024-02-09T19:51:14.373531811Z" level=info msg="StartContainer for \"c87489e677b0e571b03882ece96a33791f87997f7eb2c3172ca5b4ec4d20826c\" returns successfully" Feb 9 19:51:14.424303 kubelet[1783]: W0209 19:51:14.424209 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.424303 kubelet[1783]: E0209 19:51:14.424261 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.108:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.564026 kubelet[1783]: E0209 19:51:14.564005 1783 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.108:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.108:6443: connect: connection refused" interval="1.6s" Feb 9 19:51:14.629514 kubelet[1783]: W0209 19:51:14.629479 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.629514 kubelet[1783]: E0209 19:51:14.629515 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.108:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.654993 kubelet[1783]: W0209 19:51:14.654960 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.654993 kubelet[1783]: E0209 19:51:14.654995 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.108:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.663908 kubelet[1783]: I0209 19:51:14.663898 1783 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:51:14.664033 kubelet[1783]: E0209 19:51:14.664023 1783 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.108:6443/api/v1/nodes\": dial tcp 139.178.70.108:6443: connect: connection refused" node="localhost" Feb 9 19:51:14.719999 kubelet[1783]: W0209 19:51:14.718684 1783 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:14.719999 kubelet[1783]: E0209 19:51:14.718739 1783 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.108:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:15.332444 kubelet[1783]: E0209 19:51:15.332417 1783 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.108:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.108:6443: connect: connection refused Feb 9 19:51:16.265683 kubelet[1783]: I0209 19:51:16.265663 1783 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:51:16.438000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.438000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00027fb60 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:16.438000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:16.439000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.439000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001e0dc0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:16.439000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:16.594000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.594000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0035970e0 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:51:16.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:51:16.594000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.594000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00757e2a0 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:51:16.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:51:16.595000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.595000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c006dbd440 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:51:16.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:51:16.618000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.618000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=58 a1=c003597380 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:51:16.618000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:51:16.681000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.681000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0043ce930 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:51:16.681000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:51:16.683000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:16.683000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005049f80 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:51:16.683000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:51:16.701204 kubelet[1783]: E0209 19:51:16.701170 1783 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 9 19:51:16.791242 kubelet[1783]: I0209 19:51:16.791213 1783 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 19:51:16.797319 kubelet[1783]: E0209 19:51:16.797296 1783 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 19:51:16.897952 kubelet[1783]: E0209 19:51:16.897863 1783 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 19:51:17.148644 kubelet[1783]: I0209 19:51:17.148561 1783 apiserver.go:52] "Watching apiserver" Feb 9 19:51:17.158969 kubelet[1783]: I0209 19:51:17.158943 1783 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:51:19.233782 systemd[1]: Reloading. Feb 9 19:51:19.299888 /usr/lib/systemd/system-generators/torcx-generator[2068]: time="2024-02-09T19:51:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:51:19.299916 /usr/lib/systemd/system-generators/torcx-generator[2068]: time="2024-02-09T19:51:19Z" level=info msg="torcx already run" Feb 9 19:51:19.373689 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:51:19.373705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:51:19.388095 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:51:19.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.432512 kernel: kauditd_printk_skb: 593 callbacks suppressed Feb 9 19:51:19.432545 kernel: audit: type=1400 audit(1707508279.430:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434901 kernel: audit: type=1400 audit(1707508279.430:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.440128 kernel: audit: type=1400 audit(1707508279.431:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.442689 kernel: audit: type=1400 audit(1707508279.431:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.442767 kernel: audit: type=1400 audit(1707508279.431:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.447404 kernel: audit: type=1400 audit(1707508279.431:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.447434 kernel: audit: type=1400 audit(1707508279.431:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.452251 kernel: audit: type=1400 audit(1707508279.431:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.452271 kernel: audit: type=1400 audit(1707508279.431:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.456936 kernel: audit: type=1400 audit(1707508279.434:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit: BPF prog-id=91 op=LOAD Feb 9 19:51:19.434000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit: BPF prog-id=92 op=LOAD Feb 9 19:51:19.436000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.436000 audit: BPF prog-id=93 op=LOAD Feb 9 19:51:19.436000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit: BPF prog-id=94 op=LOAD Feb 9 19:51:19.444000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit: BPF prog-id=95 op=LOAD Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.454000 audit: BPF prog-id=96 op=LOAD Feb 9 19:51:19.454000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:51:19.454000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:51:19.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit: BPF prog-id=97 op=LOAD Feb 9 19:51:19.458000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit: BPF prog-id=98 op=LOAD Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit: BPF prog-id=99 op=LOAD Feb 9 19:51:19.459000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:51:19.459000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit: BPF prog-id=100 op=LOAD Feb 9 19:51:19.460000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.460000 audit: BPF prog-id=101 op=LOAD Feb 9 19:51:19.460000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.461000 audit: BPF prog-id=102 op=LOAD Feb 9 19:51:19.461000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.462000 audit: BPF prog-id=103 op=LOAD Feb 9 19:51:19.462000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit: BPF prog-id=104 op=LOAD Feb 9 19:51:19.464000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.464000 audit: BPF prog-id=105 op=LOAD Feb 9 19:51:19.464000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.465000 audit: BPF prog-id=106 op=LOAD Feb 9 19:51:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.466000 audit: BPF prog-id=107 op=LOAD Feb 9 19:51:19.466000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:51:19.466000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit: BPF prog-id=108 op=LOAD Feb 9 19:51:19.467000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.467000 audit: BPF prog-id=109 op=LOAD Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit: BPF prog-id=110 op=LOAD Feb 9 19:51:19.468000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:51:19.468000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.469000 audit: BPF prog-id=111 op=LOAD Feb 9 19:51:19.469000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:51:19.482731 systemd[1]: Stopping kubelet.service... Feb 9 19:51:19.498075 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:51:19.498195 systemd[1]: Stopped kubelet.service. Feb 9 19:51:19.499419 systemd[1]: Started kubelet.service. Feb 9 19:51:19.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:19.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:19.554977 kubelet[2128]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:51:19.555167 kubelet[2128]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:51:19.555205 kubelet[2128]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:51:19.555303 kubelet[2128]: I0209 19:51:19.555281 2128 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:51:19.558303 kubelet[2128]: I0209 19:51:19.558288 2128 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:51:19.558303 kubelet[2128]: I0209 19:51:19.558301 2128 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:51:19.558407 kubelet[2128]: I0209 19:51:19.558396 2128 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:51:19.559327 kubelet[2128]: I0209 19:51:19.559314 2128 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:51:19.560560 kubelet[2128]: I0209 19:51:19.560548 2128 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:51:19.563225 kubelet[2128]: I0209 19:51:19.563215 2128 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:51:19.563392 kubelet[2128]: I0209 19:51:19.563385 2128 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:51:19.563510 kubelet[2128]: I0209 19:51:19.563501 2128 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:51:19.563597 kubelet[2128]: I0209 19:51:19.563589 2128 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:51:19.563644 kubelet[2128]: I0209 19:51:19.563637 2128 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:51:19.563703 kubelet[2128]: I0209 19:51:19.563697 2128 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:51:19.563787 kubelet[2128]: I0209 19:51:19.563781 2128 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:51:19.563834 kubelet[2128]: I0209 19:51:19.563828 2128 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:51:19.563900 kubelet[2128]: I0209 19:51:19.563890 2128 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:51:19.563969 kubelet[2128]: I0209 19:51:19.563961 2128 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:51:19.569813 kubelet[2128]: I0209 19:51:19.569802 2128 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:51:19.570127 kubelet[2128]: I0209 19:51:19.570119 2128 server.go:1232] "Started kubelet" Feb 9 19:51:19.569000 audit[2128]: AVC avc: denied { mac_admin } for pid=2128 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.569000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:51:19.569000 audit[2128]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c01650 a1=c000d4cfc0 a2=c000c01620 a3=25 items=0 ppid=1 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:19.569000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:51:19.571046 kubelet[2128]: I0209 19:51:19.571038 2128 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:51:19.570000 audit[2128]: AVC avc: denied { mac_admin } for pid=2128 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.570000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:51:19.570000 audit[2128]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d43140 a1=c000d4cfd8 a2=c000c016e0 a3=25 items=0 ppid=1 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:19.570000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:51:19.571287 kubelet[2128]: I0209 19:51:19.571279 2128 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:51:19.571356 kubelet[2128]: I0209 19:51:19.571349 2128 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:51:19.574214 kubelet[2128]: I0209 19:51:19.574204 2128 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:51:19.574715 kubelet[2128]: I0209 19:51:19.574707 2128 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:51:19.575226 kubelet[2128]: E0209 19:51:19.575211 2128 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:51:19.575276 kubelet[2128]: E0209 19:51:19.575228 2128 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:51:19.575549 kubelet[2128]: I0209 19:51:19.575542 2128 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:51:19.575671 kubelet[2128]: I0209 19:51:19.575664 2128 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:51:19.577392 kubelet[2128]: I0209 19:51:19.577384 2128 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:51:19.578253 kubelet[2128]: I0209 19:51:19.578244 2128 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:51:19.578360 kubelet[2128]: I0209 19:51:19.578353 2128 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:51:19.579662 kubelet[2128]: I0209 19:51:19.579654 2128 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:51:19.580360 kubelet[2128]: I0209 19:51:19.580342 2128 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:51:19.580419 kubelet[2128]: I0209 19:51:19.580411 2128 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:51:19.580468 kubelet[2128]: I0209 19:51:19.580461 2128 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:51:19.580537 kubelet[2128]: E0209 19:51:19.580529 2128 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:51:19.621391 kubelet[2128]: I0209 19:51:19.621341 2128 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:51:19.621391 kubelet[2128]: I0209 19:51:19.621378 2128 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:51:19.621391 kubelet[2128]: I0209 19:51:19.621387 2128 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:51:19.621635 kubelet[2128]: I0209 19:51:19.621479 2128 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:51:19.621635 kubelet[2128]: I0209 19:51:19.621492 2128 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 19:51:19.621635 kubelet[2128]: I0209 19:51:19.621495 2128 policy_none.go:49] "None policy: Start" Feb 9 19:51:19.622039 kubelet[2128]: I0209 19:51:19.622026 2128 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:51:19.622039 kubelet[2128]: I0209 19:51:19.622038 2128 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:51:19.622190 kubelet[2128]: I0209 19:51:19.622111 2128 state_mem.go:75] "Updated machine memory state" Feb 9 19:51:19.624514 kubelet[2128]: I0209 19:51:19.624500 2128 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:51:19.623000 audit[2128]: AVC avc: denied { mac_admin } for pid=2128 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:19.623000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:51:19.623000 audit[2128]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b805a0 a1=c000dbe1b0 a2=c000b80570 a3=25 items=0 ppid=1 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:19.623000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:51:19.624755 kubelet[2128]: I0209 19:51:19.624534 2128 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:51:19.624755 kubelet[2128]: I0209 19:51:19.624627 2128 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:51:19.678795 kubelet[2128]: I0209 19:51:19.678782 2128 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:51:19.681154 kubelet[2128]: I0209 19:51:19.681142 2128 topology_manager.go:215] "Topology Admit Handler" podUID="0e66fee94da48878606e7250600f35e2" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 9 19:51:19.681398 kubelet[2128]: I0209 19:51:19.681389 2128 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 9 19:51:19.681472 kubelet[2128]: I0209 19:51:19.681465 2128 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 9 19:51:19.687054 kubelet[2128]: I0209 19:51:19.687034 2128 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 9 19:51:19.687213 kubelet[2128]: I0209 19:51:19.687205 2128 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 19:51:19.879678 kubelet[2128]: I0209 19:51:19.879653 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:19.879817 kubelet[2128]: I0209 19:51:19.879809 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:19.879893 kubelet[2128]: I0209 19:51:19.879886 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:19.879947 kubelet[2128]: I0209 19:51:19.879940 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:19.880005 kubelet[2128]: I0209 19:51:19.879998 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:51:19.880064 kubelet[2128]: I0209 19:51:19.880057 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e66fee94da48878606e7250600f35e2-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"0e66fee94da48878606e7250600f35e2\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:51:19.880120 kubelet[2128]: I0209 19:51:19.880112 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e66fee94da48878606e7250600f35e2-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"0e66fee94da48878606e7250600f35e2\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:51:19.880174 kubelet[2128]: I0209 19:51:19.880167 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 9 19:51:19.880227 kubelet[2128]: I0209 19:51:19.880221 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e66fee94da48878606e7250600f35e2-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"0e66fee94da48878606e7250600f35e2\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:51:20.570381 kubelet[2128]: I0209 19:51:20.570358 2128 apiserver.go:52] "Watching apiserver" Feb 9 19:51:20.578702 kubelet[2128]: I0209 19:51:20.578683 2128 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:51:20.674755 kubelet[2128]: I0209 19:51:20.674735 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.674701535 podCreationTimestamp="2024-02-09 19:51:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:51:20.667652484 +0000 UTC m=+1.160906566" watchObservedRunningTime="2024-02-09 19:51:20.674701535 +0000 UTC m=+1.167955613" Feb 9 19:51:20.699982 kubelet[2128]: I0209 19:51:20.698078 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.698054824 podCreationTimestamp="2024-02-09 19:51:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:51:20.675975689 +0000 UTC m=+1.169229771" watchObservedRunningTime="2024-02-09 19:51:20.698054824 +0000 UTC m=+1.191308901" Feb 9 19:51:20.718841 kubelet[2128]: I0209 19:51:20.718813 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.7187907500000001 podCreationTimestamp="2024-02-09 19:51:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:51:20.698244625 +0000 UTC m=+1.191498708" watchObservedRunningTime="2024-02-09 19:51:20.71879075 +0000 UTC m=+1.212044834" Feb 9 19:51:23.979950 sudo[1356]: pam_unix(sudo:session): session closed for user root Feb 9 19:51:23.979000 audit[1356]: USER_END pid=1356 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:51:23.979000 audit[1356]: CRED_DISP pid=1356 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:51:23.983538 sshd[1352]: pam_unix(sshd:session): session closed for user core Feb 9 19:51:23.983000 audit[1352]: USER_END pid=1352 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:51:23.983000 audit[1352]: CRED_DISP pid=1352 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:51:23.985437 systemd-logind[1145]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:51:23.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.108:22-139.178.89.65:40034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:51:23.985765 systemd[1]: sshd@6-139.178.70.108:22-139.178.89.65:40034.service: Deactivated successfully. Feb 9 19:51:23.986254 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:51:23.986349 systemd[1]: session-9.scope: Consumed 2.639s CPU time. Feb 9 19:51:23.987246 systemd-logind[1145]: Removed session 9. Feb 9 19:51:31.240536 kernel: kauditd_printk_skb: 253 callbacks suppressed Feb 9 19:51:31.240622 kernel: audit: type=1400 audit(1707508291.235:947): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.235000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.235000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8ae0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.247374 kernel: audit: type=1300 audit(1707508291.235:947): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8ae0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.247920 kernel: audit: type=1327 audit(1707508291.235:947): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.239000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.254432 kernel: audit: type=1400 audit(1707508291.239:948): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.239000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8b20 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.262327 kernel: audit: type=1300 audit(1707508291.239:948): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8b20 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.262392 kernel: audit: type=1327 audit(1707508291.239:948): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.239000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.265536 kernel: audit: type=1400 audit(1707508291.239:949): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.239000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8d60 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.273738 kernel: audit: type=1300 audit(1707508291.239:949): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8d60 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.273808 kernel: audit: type=1327 audit(1707508291.239:949): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.273827 kernel: audit: type=1400 audit(1707508291.239:950): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.239000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:51:31.239000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da8ea0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:31.857000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:51:31.857000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001044bc0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:51:31.857000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:51:34.333718 kubelet[2128]: I0209 19:51:34.333697 2128 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:51:34.334166 env[1176]: time="2024-02-09T19:51:34.334147229Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:51:34.334436 kubelet[2128]: I0209 19:51:34.334421 2128 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:51:34.938133 kubelet[2128]: I0209 19:51:34.938107 2128 topology_manager.go:215] "Topology Admit Handler" podUID="ccb1bb6a-d3cf-4b7a-982f-b5a1134da203" podNamespace="kube-system" podName="kube-proxy-gdm7z" Feb 9 19:51:34.942239 systemd[1]: Created slice kubepods-besteffort-podccb1bb6a_d3cf_4b7a_982f_b5a1134da203.slice. Feb 9 19:51:34.968115 kubelet[2128]: I0209 19:51:34.968095 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ccb1bb6a-d3cf-4b7a-982f-b5a1134da203-kube-proxy\") pod \"kube-proxy-gdm7z\" (UID: \"ccb1bb6a-d3cf-4b7a-982f-b5a1134da203\") " pod="kube-system/kube-proxy-gdm7z" Feb 9 19:51:34.968260 kubelet[2128]: I0209 19:51:34.968253 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ccb1bb6a-d3cf-4b7a-982f-b5a1134da203-xtables-lock\") pod \"kube-proxy-gdm7z\" (UID: \"ccb1bb6a-d3cf-4b7a-982f-b5a1134da203\") " pod="kube-system/kube-proxy-gdm7z" Feb 9 19:51:34.968342 kubelet[2128]: I0209 19:51:34.968336 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ccb1bb6a-d3cf-4b7a-982f-b5a1134da203-lib-modules\") pod \"kube-proxy-gdm7z\" (UID: \"ccb1bb6a-d3cf-4b7a-982f-b5a1134da203\") " pod="kube-system/kube-proxy-gdm7z" Feb 9 19:51:34.968415 kubelet[2128]: I0209 19:51:34.968409 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t7j6t\" (UniqueName: \"kubernetes.io/projected/ccb1bb6a-d3cf-4b7a-982f-b5a1134da203-kube-api-access-t7j6t\") pod \"kube-proxy-gdm7z\" (UID: \"ccb1bb6a-d3cf-4b7a-982f-b5a1134da203\") " pod="kube-system/kube-proxy-gdm7z" Feb 9 19:51:35.234833 kubelet[2128]: I0209 19:51:35.234775 2128 topology_manager.go:215] "Topology Admit Handler" podUID="e8d11cfc-8af9-465f-9889-78b039878a6d" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-4dpqg" Feb 9 19:51:35.238075 systemd[1]: Created slice kubepods-besteffort-pode8d11cfc_8af9_465f_9889_78b039878a6d.slice. Feb 9 19:51:35.252670 env[1176]: time="2024-02-09T19:51:35.252426880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gdm7z,Uid:ccb1bb6a-d3cf-4b7a-982f-b5a1134da203,Namespace:kube-system,Attempt:0,}" Feb 9 19:51:35.263265 env[1176]: time="2024-02-09T19:51:35.263221934Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:35.263380 env[1176]: time="2024-02-09T19:51:35.263248023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:35.263380 env[1176]: time="2024-02-09T19:51:35.263258458Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:35.265865 env[1176]: time="2024-02-09T19:51:35.263495800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b75db533e651e4c4b33d25f853ad4992254fbdfba9d3054df81e9568f8c77049 pid=2209 runtime=io.containerd.runc.v2 Feb 9 19:51:35.269637 kubelet[2128]: I0209 19:51:35.269621 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-524b4\" (UniqueName: \"kubernetes.io/projected/e8d11cfc-8af9-465f-9889-78b039878a6d-kube-api-access-524b4\") pod \"tigera-operator-55585899bf-4dpqg\" (UID: \"e8d11cfc-8af9-465f-9889-78b039878a6d\") " pod="tigera-operator/tigera-operator-55585899bf-4dpqg" Feb 9 19:51:35.269751 kubelet[2128]: I0209 19:51:35.269743 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e8d11cfc-8af9-465f-9889-78b039878a6d-var-lib-calico\") pod \"tigera-operator-55585899bf-4dpqg\" (UID: \"e8d11cfc-8af9-465f-9889-78b039878a6d\") " pod="tigera-operator/tigera-operator-55585899bf-4dpqg" Feb 9 19:51:35.277492 systemd[1]: Started cri-containerd-b75db533e651e4c4b33d25f853ad4992254fbdfba9d3054df81e9568f8c77049.scope. Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit: BPF prog-id=112 op=LOAD Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237356462353333653635316534633462333364323566383533616434 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237356462353333653635316534633462333364323566383533616434 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit: BPF prog-id=113 op=LOAD Feb 9 19:51:35.284000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd210 items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237356462353333653635316534633462333364323566383533616434 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit: BPF prog-id=114 op=LOAD Feb 9 19:51:35.284000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd258 items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237356462353333653635316534633462333364323566383533616434 Feb 9 19:51:35.284000 audit: BPF prog-id=114 op=UNLOAD Feb 9 19:51:35.284000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.284000 audit: BPF prog-id=115 op=LOAD Feb 9 19:51:35.284000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dd668 items=0 ppid=2209 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237356462353333653635316534633462333364323566383533616434 Feb 9 19:51:35.294022 env[1176]: time="2024-02-09T19:51:35.293999945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gdm7z,Uid:ccb1bb6a-d3cf-4b7a-982f-b5a1134da203,Namespace:kube-system,Attempt:0,} returns sandbox id \"b75db533e651e4c4b33d25f853ad4992254fbdfba9d3054df81e9568f8c77049\"" Feb 9 19:51:35.296540 env[1176]: time="2024-02-09T19:51:35.296501812Z" level=info msg="CreateContainer within sandbox \"b75db533e651e4c4b33d25f853ad4992254fbdfba9d3054df81e9568f8c77049\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:51:35.372974 env[1176]: time="2024-02-09T19:51:35.372942338Z" level=info msg="CreateContainer within sandbox \"b75db533e651e4c4b33d25f853ad4992254fbdfba9d3054df81e9568f8c77049\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"63b0453555e2212310367e3d20d2930f04b752e169c4175fceef33e632e36465\"" Feb 9 19:51:35.374627 env[1176]: time="2024-02-09T19:51:35.373677951Z" level=info msg="StartContainer for \"63b0453555e2212310367e3d20d2930f04b752e169c4175fceef33e632e36465\"" Feb 9 19:51:35.385191 systemd[1]: Started cri-containerd-63b0453555e2212310367e3d20d2930f04b752e169c4175fceef33e632e36465.scope. Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2209 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633623034353335353565323231323331303336376533643230643239 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.395000 audit: BPF prog-id=116 op=LOAD Feb 9 19:51:35.395000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028cde0 items=0 ppid=2209 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633623034353335353565323231323331303336376533643230643239 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit: BPF prog-id=117 op=LOAD Feb 9 19:51:35.396000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028ce28 items=0 ppid=2209 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633623034353335353565323231323331303336376533643230643239 Feb 9 19:51:35.396000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:51:35.396000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.396000 audit: BPF prog-id=118 op=LOAD Feb 9 19:51:35.396000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028ceb8 items=0 ppid=2209 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633623034353335353565323231323331303336376533643230643239 Feb 9 19:51:35.419993 env[1176]: time="2024-02-09T19:51:35.419963323Z" level=info msg="StartContainer for \"63b0453555e2212310367e3d20d2930f04b752e169c4175fceef33e632e36465\" returns successfully" Feb 9 19:51:35.543280 env[1176]: time="2024-02-09T19:51:35.541295539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-4dpqg,Uid:e8d11cfc-8af9-465f-9889-78b039878a6d,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:51:35.571613 env[1176]: time="2024-02-09T19:51:35.571518826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:35.571613 env[1176]: time="2024-02-09T19:51:35.571564648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:35.571613 env[1176]: time="2024-02-09T19:51:35.571576076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:35.572117 env[1176]: time="2024-02-09T19:51:35.571849063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/027f33d5c70daaaf07a4967ddda0c8a7b3a7b5c68e47fcdac0b65fef4aca0b1c pid=2284 runtime=io.containerd.runc.v2 Feb 9 19:51:35.586398 systemd[1]: Started cri-containerd-027f33d5c70daaaf07a4967ddda0c8a7b3a7b5c68e47fcdac0b65fef4aca0b1c.scope. Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.596000 audit: BPF prog-id=119 op=LOAD Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2284 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376633336435633730646161616630376134393637646464613063 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2284 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376633336435633730646161616630376134393637646464613063 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.597000 audit: BPF prog-id=120 op=LOAD Feb 9 19:51:35.597000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003385d0 items=0 ppid=2284 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376633336435633730646161616630376134393637646464613063 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit: BPF prog-id=121 op=LOAD Feb 9 19:51:35.599000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000338618 items=0 ppid=2284 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376633336435633730646161616630376134393637646464613063 Feb 9 19:51:35.599000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:51:35.599000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:35.599000 audit: BPF prog-id=122 op=LOAD Feb 9 19:51:35.599000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000338a28 items=0 ppid=2284 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:35.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376633336435633730646161616630376134393637646464613063 Feb 9 19:51:35.623391 env[1176]: time="2024-02-09T19:51:35.623363628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-4dpqg,Uid:e8d11cfc-8af9-465f-9889-78b039878a6d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"027f33d5c70daaaf07a4967ddda0c8a7b3a7b5c68e47fcdac0b65fef4aca0b1c\"" Feb 9 19:51:35.631938 kubelet[2128]: I0209 19:51:35.631843 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-gdm7z" podStartSLOduration=1.631818837 podCreationTimestamp="2024-02-09 19:51:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:51:35.631802684 +0000 UTC m=+16.125056767" watchObservedRunningTime="2024-02-09 19:51:35.631818837 +0000 UTC m=+16.125072915" Feb 9 19:51:35.634335 env[1176]: time="2024-02-09T19:51:35.634305728Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:51:36.043000 audit[2342]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.043000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef9808530 a2=0 a3=7ffef980851c items=0 ppid=2261 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:51:36.044000 audit[2343]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.044000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8c017c00 a2=0 a3=7ffe8c017bec items=0 ppid=2261 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:51:36.044000 audit[2345]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.044000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff51f0f4d0 a2=0 a3=7fff51f0f4bc items=0 ppid=2261 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.044000 audit[2346]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.044000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc61d2d180 a2=0 a3=7ffc61d2d16c items=0 ppid=2261 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:51:36.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:51:36.048000 audit[2347]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.048000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8b471c00 a2=0 a3=7ffc8b471bec items=0 ppid=2261 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:51:36.049000 audit[2348]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.049000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe333e5410 a2=0 a3=7ffe333e53fc items=0 ppid=2261 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:51:36.085445 systemd[1]: run-containerd-runc-k8s.io-b75db533e651e4c4b33d25f853ad4992254fbdfba9d3054df81e9568f8c77049-runc.d3fFaM.mount: Deactivated successfully. Feb 9 19:51:36.149000 audit[2349]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.149000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffaa50a070 a2=0 a3=7fffaa50a05c items=0 ppid=2261 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:51:36.169000 audit[2351]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.169000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc0f86e640 a2=0 a3=7ffc0f86e62c items=0 ppid=2261 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:51:36.178000 audit[2354]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.178000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff2d04f5b0 a2=0 a3=7fff2d04f59c items=0 ppid=2261 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:51:36.179000 audit[2355]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.179000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1c8d0ff0 a2=0 a3=7ffd1c8d0fdc items=0 ppid=2261 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:51:36.181000 audit[2357]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.181000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc98f6b450 a2=0 a3=7ffc98f6b43c items=0 ppid=2261 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:51:36.182000 audit[2358]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.182000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3e5a0bd0 a2=0 a3=7ffd3e5a0bbc items=0 ppid=2261 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:51:36.184000 audit[2360]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.184000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff7991d740 a2=0 a3=7fff7991d72c items=0 ppid=2261 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:51:36.187000 audit[2363]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.187000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd18cfd50 a2=0 a3=7ffdd18cfd3c items=0 ppid=2261 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:51:36.188000 audit[2364]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.188000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedf514fd0 a2=0 a3=7ffedf514fbc items=0 ppid=2261 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:51:36.190000 audit[2366]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.190000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3681c780 a2=0 a3=7ffd3681c76c items=0 ppid=2261 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:51:36.191000 audit[2367]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.191000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbf33b990 a2=0 a3=7ffcbf33b97c items=0 ppid=2261 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:51:36.193000 audit[2369]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.193000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff662c5b30 a2=0 a3=7fff662c5b1c items=0 ppid=2261 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:51:36.196000 audit[2372]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.196000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4638cdf0 a2=0 a3=7fff4638cddc items=0 ppid=2261 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:51:36.199000 audit[2375]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.199000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9dfc29f0 a2=0 a3=7fff9dfc29dc items=0 ppid=2261 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:51:36.200000 audit[2376]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.200000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff7671dc50 a2=0 a3=7fff7671dc3c items=0 ppid=2261 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:51:36.203000 audit[2378]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.203000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcb2a52eb0 a2=0 a3=7ffcb2a52e9c items=0 ppid=2261 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:51:36.205000 audit[2381]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.205000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe473bcb20 a2=0 a3=7ffe473bcb0c items=0 ppid=2261 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:51:36.206000 audit[2382]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.206000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2dbe5d70 a2=0 a3=7ffe2dbe5d5c items=0 ppid=2261 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:51:36.207000 audit[2384]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:51:36.207000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff2fb89570 a2=0 a3=7fff2fb8955c items=0 ppid=2261 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:51:36.225000 audit[2390]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:36.225000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd456a1180 a2=0 a3=7ffd456a116c items=0 ppid=2261 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:36.229000 audit[2390]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:36.229000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd456a1180 a2=0 a3=7ffd456a116c items=0 ppid=2261 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:36.231000 audit[2395]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.231000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc94a26610 a2=0 a3=7ffc94a265fc items=0 ppid=2261 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:51:36.232000 audit[2397]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.232000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed942e580 a2=0 a3=7ffed942e56c items=0 ppid=2261 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:51:36.235000 audit[2400]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.235000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd76f533d0 a2=0 a3=7ffd76f533bc items=0 ppid=2261 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:51:36.235000 audit[2401]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.235000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2ea56670 a2=0 a3=7ffc2ea5665c items=0 ppid=2261 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:51:36.237000 audit[2403]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.239061 kernel: kauditd_printk_skb: 255 callbacks suppressed Feb 9 19:51:36.239092 kernel: audit: type=1325 audit(1707508296.237:1025): table=filter:69 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.237000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb99af500 a2=0 a3=7ffeb99af4ec items=0 ppid=2261 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.244654 kernel: audit: type=1300 audit(1707508296.237:1025): arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb99af500 a2=0 a3=7ffeb99af4ec items=0 ppid=2261 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.244682 kernel: audit: type=1327 audit(1707508296.237:1025): proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:51:36.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:51:36.247000 audit[2404]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.247000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0fbb3810 a2=0 a3=7ffe0fbb37fc items=0 ppid=2261 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.254048 kernel: audit: type=1325 audit(1707508296.247:1026): table=filter:70 family=10 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.254101 kernel: audit: type=1300 audit(1707508296.247:1026): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0fbb3810 a2=0 a3=7ffe0fbb37fc items=0 ppid=2261 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.254124 kernel: audit: type=1327 audit(1707508296.247:1026): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:51:36.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:51:36.253000 audit[2406]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.257852 kernel: audit: type=1325 audit(1707508296.253:1027): table=filter:71 family=10 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.253000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff215bd3b0 a2=0 a3=7fff215bd39c items=0 ppid=2261 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.263216 kernel: audit: type=1300 audit(1707508296.253:1027): arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff215bd3b0 a2=0 a3=7fff215bd39c items=0 ppid=2261 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:51:36.257000 audit[2409]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.269436 kernel: audit: type=1327 audit(1707508296.253:1027): proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:51:36.269479 kernel: audit: type=1325 audit(1707508296.257:1028): table=filter:72 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.257000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd14c84f80 a2=0 a3=7ffd14c84f6c items=0 ppid=2261 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:51:36.262000 audit[2410]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.262000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc97315e70 a2=0 a3=7ffc97315e5c items=0 ppid=2261 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:51:36.267000 audit[2412]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.267000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5ad6e4a0 a2=0 a3=7ffe5ad6e48c items=0 ppid=2261 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:51:36.269000 audit[2413]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.269000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdf364110 a2=0 a3=7fffdf3640fc items=0 ppid=2261 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:51:36.270000 audit[2415]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.270000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcdbedbd90 a2=0 a3=7ffcdbedbd7c items=0 ppid=2261 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:51:36.273000 audit[2418]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.273000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd9d3e100 a2=0 a3=7fffd9d3e0ec items=0 ppid=2261 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:51:36.275000 audit[2421]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.275000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce7eb1b10 a2=0 a3=7ffce7eb1afc items=0 ppid=2261 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:51:36.276000 audit[2422]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.276000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed7452eb0 a2=0 a3=7ffed7452e9c items=0 ppid=2261 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:51:36.277000 audit[2424]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.277000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff87233c30 a2=0 a3=7fff87233c1c items=0 ppid=2261 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:51:36.279000 audit[2427]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.279000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeea89d5d0 a2=0 a3=7ffeea89d5bc items=0 ppid=2261 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:51:36.280000 audit[2428]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.280000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff69640730 a2=0 a3=7fff6964071c items=0 ppid=2261 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:51:36.281000 audit[2430]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.281000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffffb6af110 a2=0 a3=7ffffb6af0fc items=0 ppid=2261 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:51:36.282000 audit[2431]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.282000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0b897b00 a2=0 a3=7ffd0b897aec items=0 ppid=2261 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:51:36.283000 audit[2433]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.283000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1909e940 a2=0 a3=7ffc1909e92c items=0 ppid=2261 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:51:36.285000 audit[2436]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:51:36.285000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd56238a00 a2=0 a3=7ffd562389ec items=0 ppid=2261 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:51:36.287000 audit[2438]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:51:36.287000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff098402d0 a2=0 a3=7fff098402bc items=0 ppid=2261 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.287000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:36.288000 audit[2438]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:51:36.288000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff098402d0 a2=0 a3=7fff098402bc items=0 ppid=2261 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:36.288000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:36.836403 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount756891605.mount: Deactivated successfully. Feb 9 19:51:37.698360 env[1176]: time="2024-02-09T19:51:37.698332172Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:37.699589 env[1176]: time="2024-02-09T19:51:37.699568845Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:37.701908 env[1176]: time="2024-02-09T19:51:37.701891811Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:37.702847 env[1176]: time="2024-02-09T19:51:37.702832005Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:37.703336 env[1176]: time="2024-02-09T19:51:37.703319124Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:51:37.705710 env[1176]: time="2024-02-09T19:51:37.705693124Z" level=info msg="CreateContainer within sandbox \"027f33d5c70daaaf07a4967ddda0c8a7b3a7b5c68e47fcdac0b65fef4aca0b1c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:51:37.710652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2883398016.mount: Deactivated successfully. Feb 9 19:51:37.713429 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount275854996.mount: Deactivated successfully. Feb 9 19:51:37.724529 env[1176]: time="2024-02-09T19:51:37.724501860Z" level=info msg="CreateContainer within sandbox \"027f33d5c70daaaf07a4967ddda0c8a7b3a7b5c68e47fcdac0b65fef4aca0b1c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"656bda93690b9bfcc12a93dd2245aaccf8f842bf5fb20b03deba0efb0268e2be\"" Feb 9 19:51:37.725815 env[1176]: time="2024-02-09T19:51:37.725798659Z" level=info msg="StartContainer for \"656bda93690b9bfcc12a93dd2245aaccf8f842bf5fb20b03deba0efb0268e2be\"" Feb 9 19:51:37.739113 systemd[1]: Started cri-containerd-656bda93690b9bfcc12a93dd2245aaccf8f842bf5fb20b03deba0efb0268e2be.scope. Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.746000 audit: BPF prog-id=123 op=LOAD Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2284 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:37.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366264613933363930623962666363313261393364643232343561 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2284 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:37.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366264613933363930623962666363313261393364643232343561 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.747000 audit: BPF prog-id=124 op=LOAD Feb 9 19:51:37.747000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003320a0 items=0 ppid=2284 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:37.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366264613933363930623962666363313261393364643232343561 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit: BPF prog-id=125 op=LOAD Feb 9 19:51:37.748000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003320e8 items=0 ppid=2284 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:37.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366264613933363930623962666363313261393364643232343561 Feb 9 19:51:37.748000 audit: BPF prog-id=125 op=UNLOAD Feb 9 19:51:37.748000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:37.748000 audit: BPF prog-id=126 op=LOAD Feb 9 19:51:37.748000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003324f8 items=0 ppid=2284 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:37.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366264613933363930623962666363313261393364643232343561 Feb 9 19:51:37.759204 env[1176]: time="2024-02-09T19:51:37.759178715Z" level=info msg="StartContainer for \"656bda93690b9bfcc12a93dd2245aaccf8f842bf5fb20b03deba0efb0268e2be\" returns successfully" Feb 9 19:51:39.336000 audit[2477]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:39.336000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fffe69ceb50 a2=0 a3=7fffe69ceb3c items=0 ppid=2261 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:39.336000 audit[2477]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:39.336000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fffe69ceb50 a2=0 a3=31030 items=0 ppid=2261 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:39.342000 audit[2479]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:39.342000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffedd1e4450 a2=0 a3=7ffedd1e443c items=0 ppid=2261 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:39.344000 audit[2479]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:39.344000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffedd1e4450 a2=0 a3=31030 items=0 ppid=2261 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:39.454915 kubelet[2128]: I0209 19:51:39.454892 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-4dpqg" podStartSLOduration=2.3852501090000002 podCreationTimestamp="2024-02-09 19:51:35 +0000 UTC" firstStartedPulling="2024-02-09 19:51:35.633943873 +0000 UTC m=+16.127197947" lastFinishedPulling="2024-02-09 19:51:37.703527486 +0000 UTC m=+18.196781557" observedRunningTime="2024-02-09 19:51:38.630942985 +0000 UTC m=+19.124197067" watchObservedRunningTime="2024-02-09 19:51:39.454833719 +0000 UTC m=+19.948087796" Feb 9 19:51:39.455337 kubelet[2128]: I0209 19:51:39.455327 2128 topology_manager.go:215] "Topology Admit Handler" podUID="24d5722e-4333-420f-825d-e95d0546e10d" podNamespace="calico-system" podName="calico-typha-57957fd4fc-drqzt" Feb 9 19:51:39.458605 systemd[1]: Created slice kubepods-besteffort-pod24d5722e_4333_420f_825d_e95d0546e10d.slice. Feb 9 19:51:39.498094 kubelet[2128]: I0209 19:51:39.498073 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/24d5722e-4333-420f-825d-e95d0546e10d-typha-certs\") pod \"calico-typha-57957fd4fc-drqzt\" (UID: \"24d5722e-4333-420f-825d-e95d0546e10d\") " pod="calico-system/calico-typha-57957fd4fc-drqzt" Feb 9 19:51:39.498260 kubelet[2128]: I0209 19:51:39.498249 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/24d5722e-4333-420f-825d-e95d0546e10d-tigera-ca-bundle\") pod \"calico-typha-57957fd4fc-drqzt\" (UID: \"24d5722e-4333-420f-825d-e95d0546e10d\") " pod="calico-system/calico-typha-57957fd4fc-drqzt" Feb 9 19:51:39.498344 kubelet[2128]: I0209 19:51:39.498337 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2rck\" (UniqueName: \"kubernetes.io/projected/24d5722e-4333-420f-825d-e95d0546e10d-kube-api-access-j2rck\") pod \"calico-typha-57957fd4fc-drqzt\" (UID: \"24d5722e-4333-420f-825d-e95d0546e10d\") " pod="calico-system/calico-typha-57957fd4fc-drqzt" Feb 9 19:51:39.502097 kubelet[2128]: I0209 19:51:39.502081 2128 topology_manager.go:215] "Topology Admit Handler" podUID="844a052d-5941-4560-9aa8-224ef8afc66f" podNamespace="calico-system" podName="calico-node-nltrq" Feb 9 19:51:39.505528 systemd[1]: Created slice kubepods-besteffort-pod844a052d_5941_4560_9aa8_224ef8afc66f.slice. Feb 9 19:51:39.598748 kubelet[2128]: I0209 19:51:39.598694 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-xtables-lock\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.598870 kubelet[2128]: I0209 19:51:39.598862 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-var-run-calico\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.598939 kubelet[2128]: I0209 19:51:39.598931 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-cni-net-dir\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.598999 kubelet[2128]: I0209 19:51:39.598992 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pl6qv\" (UniqueName: \"kubernetes.io/projected/844a052d-5941-4560-9aa8-224ef8afc66f-kube-api-access-pl6qv\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599055 kubelet[2128]: I0209 19:51:39.599048 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-var-lib-calico\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599117 kubelet[2128]: I0209 19:51:39.599110 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-cni-bin-dir\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599179 kubelet[2128]: I0209 19:51:39.599172 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-policysync\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599243 kubelet[2128]: I0209 19:51:39.599235 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/844a052d-5941-4560-9aa8-224ef8afc66f-tigera-ca-bundle\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599316 kubelet[2128]: I0209 19:51:39.599304 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-cni-log-dir\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599381 kubelet[2128]: I0209 19:51:39.599369 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-lib-modules\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599439 kubelet[2128]: I0209 19:51:39.599432 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/844a052d-5941-4560-9aa8-224ef8afc66f-node-certs\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.599978 kubelet[2128]: I0209 19:51:39.599965 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/844a052d-5941-4560-9aa8-224ef8afc66f-flexvol-driver-host\") pod \"calico-node-nltrq\" (UID: \"844a052d-5941-4560-9aa8-224ef8afc66f\") " pod="calico-system/calico-node-nltrq" Feb 9 19:51:39.663023 kubelet[2128]: I0209 19:51:39.663004 2128 topology_manager.go:215] "Topology Admit Handler" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" podNamespace="calico-system" podName="csi-node-driver-4kpxb" Feb 9 19:51:39.663947 kubelet[2128]: E0209 19:51:39.663299 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:39.700255 kubelet[2128]: I0209 19:51:39.700234 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdwpd\" (UniqueName: \"kubernetes.io/projected/54d1291f-fe29-442a-b31e-c69d6ea59d02-kube-api-access-sdwpd\") pod \"csi-node-driver-4kpxb\" (UID: \"54d1291f-fe29-442a-b31e-c69d6ea59d02\") " pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:39.700497 kubelet[2128]: I0209 19:51:39.700263 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/54d1291f-fe29-442a-b31e-c69d6ea59d02-varrun\") pod \"csi-node-driver-4kpxb\" (UID: \"54d1291f-fe29-442a-b31e-c69d6ea59d02\") " pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:39.700497 kubelet[2128]: I0209 19:51:39.700329 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/54d1291f-fe29-442a-b31e-c69d6ea59d02-socket-dir\") pod \"csi-node-driver-4kpxb\" (UID: \"54d1291f-fe29-442a-b31e-c69d6ea59d02\") " pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:39.700497 kubelet[2128]: I0209 19:51:39.700366 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/54d1291f-fe29-442a-b31e-c69d6ea59d02-kubelet-dir\") pod \"csi-node-driver-4kpxb\" (UID: \"54d1291f-fe29-442a-b31e-c69d6ea59d02\") " pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:39.700497 kubelet[2128]: I0209 19:51:39.700406 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/54d1291f-fe29-442a-b31e-c69d6ea59d02-registration-dir\") pod \"csi-node-driver-4kpxb\" (UID: \"54d1291f-fe29-442a-b31e-c69d6ea59d02\") " pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:39.705264 kubelet[2128]: E0209 19:51:39.705250 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.705355 kubelet[2128]: W0209 19:51:39.705344 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.705415 kubelet[2128]: E0209 19:51:39.705406 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.718034 kubelet[2128]: E0209 19:51:39.718014 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.718126 kubelet[2128]: W0209 19:51:39.718115 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.718185 kubelet[2128]: E0209 19:51:39.718177 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.760756 env[1176]: time="2024-02-09T19:51:39.760464069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57957fd4fc-drqzt,Uid:24d5722e-4333-420f-825d-e95d0546e10d,Namespace:calico-system,Attempt:0,}" Feb 9 19:51:39.769765 env[1176]: time="2024-02-09T19:51:39.769717483Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:39.769765 env[1176]: time="2024-02-09T19:51:39.769739386Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:39.769765 env[1176]: time="2024-02-09T19:51:39.769746218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:39.770378 env[1176]: time="2024-02-09T19:51:39.769967732Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3777e6199e1214e821f44fb8df46980182a38280ca859267a672c774232ca55 pid=2494 runtime=io.containerd.runc.v2 Feb 9 19:51:39.784656 systemd[1]: Started cri-containerd-b3777e6199e1214e821f44fb8df46980182a38280ca859267a672c774232ca55.scope. Feb 9 19:51:39.801660 kubelet[2128]: E0209 19:51:39.801578 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.801660 kubelet[2128]: W0209 19:51:39.801589 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.801660 kubelet[2128]: E0209 19:51:39.801603 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.801904 kubelet[2128]: E0209 19:51:39.801857 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.801904 kubelet[2128]: W0209 19:51:39.801863 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.801904 kubelet[2128]: E0209 19:51:39.801873 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.801982 kubelet[2128]: E0209 19:51:39.801978 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802010 kubelet[2128]: W0209 19:51:39.801984 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.802010 kubelet[2128]: E0209 19:51:39.801997 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.802081 kubelet[2128]: E0209 19:51:39.802077 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802102 kubelet[2128]: W0209 19:51:39.802082 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.802102 kubelet[2128]: E0209 19:51:39.802089 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.802216 kubelet[2128]: E0209 19:51:39.802164 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802216 kubelet[2128]: W0209 19:51:39.802170 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.802216 kubelet[2128]: E0209 19:51:39.802177 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.802495 kubelet[2128]: E0209 19:51:39.802424 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802495 kubelet[2128]: W0209 19:51:39.802430 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.802495 kubelet[2128]: E0209 19:51:39.802438 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.802659 kubelet[2128]: E0209 19:51:39.802593 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802659 kubelet[2128]: W0209 19:51:39.802599 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.802659 kubelet[2128]: E0209 19:51:39.802607 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.802916 kubelet[2128]: E0209 19:51:39.802772 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802916 kubelet[2128]: W0209 19:51:39.802777 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.802916 kubelet[2128]: E0209 19:51:39.802786 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.802916 kubelet[2128]: E0209 19:51:39.802902 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.802916 kubelet[2128]: W0209 19:51:39.802911 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803027 kubelet[2128]: E0209 19:51:39.802922 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803027 kubelet[2128]: E0209 19:51:39.803012 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803027 kubelet[2128]: W0209 19:51:39.803017 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803027 kubelet[2128]: E0209 19:51:39.803023 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803100 kubelet[2128]: E0209 19:51:39.803097 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803119 kubelet[2128]: W0209 19:51:39.803101 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803119 kubelet[2128]: E0209 19:51:39.803108 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803189 kubelet[2128]: E0209 19:51:39.803179 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803189 kubelet[2128]: W0209 19:51:39.803186 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803250 kubelet[2128]: E0209 19:51:39.803195 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803306 kubelet[2128]: E0209 19:51:39.803289 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803306 kubelet[2128]: W0209 19:51:39.803294 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803306 kubelet[2128]: E0209 19:51:39.803303 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803385 kubelet[2128]: E0209 19:51:39.803379 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803410 kubelet[2128]: W0209 19:51:39.803385 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803410 kubelet[2128]: E0209 19:51:39.803391 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803477 kubelet[2128]: E0209 19:51:39.803464 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803477 kubelet[2128]: W0209 19:51:39.803473 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803541 kubelet[2128]: E0209 19:51:39.803484 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803563 kubelet[2128]: E0209 19:51:39.803556 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803563 kubelet[2128]: W0209 19:51:39.803560 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803599 kubelet[2128]: E0209 19:51:39.803566 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803661 kubelet[2128]: E0209 19:51:39.803649 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803661 kubelet[2128]: W0209 19:51:39.803657 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803719 kubelet[2128]: E0209 19:51:39.803663 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803755 kubelet[2128]: E0209 19:51:39.803740 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803755 kubelet[2128]: W0209 19:51:39.803746 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803755 kubelet[2128]: E0209 19:51:39.803756 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803836 kubelet[2128]: E0209 19:51:39.803832 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.803836 kubelet[2128]: W0209 19:51:39.803836 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.803898 kubelet[2128]: E0209 19:51:39.803841 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.803000 audit: BPF prog-id=127 op=LOAD Feb 9 19:51:39.805047 kubelet[2128]: E0209 19:51:39.804814 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.805047 kubelet[2128]: W0209 19:51:39.804821 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.805047 kubelet[2128]: E0209 19:51:39.804920 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.805047 kubelet[2128]: W0209 19:51:39.804924 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.805047 kubelet[2128]: E0209 19:51:39.804931 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.805047 kubelet[2128]: E0209 19:51:39.804934 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.805047 kubelet[2128]: E0209 19:51:39.805017 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.805047 kubelet[2128]: W0209 19:51:39.805021 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.805047 kubelet[2128]: E0209 19:51:39.805032 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.805214 kubelet[2128]: E0209 19:51:39.805104 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.805214 kubelet[2128]: W0209 19:51:39.805107 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.805214 kubelet[2128]: E0209 19:51:39.805113 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.805214 kubelet[2128]: E0209 19:51:39.805198 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.805214 kubelet[2128]: W0209 19:51:39.805202 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.805214 kubelet[2128]: E0209 19:51:39.805208 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.805466 kubelet[2128]: E0209 19:51:39.805441 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.805466 kubelet[2128]: W0209 19:51:39.805447 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.805466 kubelet[2128]: E0209 19:51:39.805454 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.804000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.804000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2494 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373737653631393965313231346538323166343466623864663436 Feb 9 19:51:39.804000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.804000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2494 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373737653631393965313231346538323166343466623864663436 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit: BPF prog-id=128 op=LOAD Feb 9 19:51:39.805000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000220b90 items=0 ppid=2494 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373737653631393965313231346538323166343466623864663436 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.805000 audit: BPF prog-id=129 op=LOAD Feb 9 19:51:39.805000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220bd8 items=0 ppid=2494 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373737653631393965313231346538323166343466623864663436 Feb 9 19:51:39.809312 env[1176]: time="2024-02-09T19:51:39.809260879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nltrq,Uid:844a052d-5941-4560-9aa8-224ef8afc66f,Namespace:calico-system,Attempt:0,}" Feb 9 19:51:39.808000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:51:39.808000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.808000 audit: BPF prog-id=130 op=LOAD Feb 9 19:51:39.808000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000220fe8 items=0 ppid=2494 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233373737653631393965313231346538323166343466623864663436 Feb 9 19:51:39.816267 kubelet[2128]: E0209 19:51:39.816221 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:39.816267 kubelet[2128]: W0209 19:51:39.816231 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:39.816267 kubelet[2128]: E0209 19:51:39.816243 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:39.821189 env[1176]: time="2024-02-09T19:51:39.821136555Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:51:39.821251 env[1176]: time="2024-02-09T19:51:39.821190824Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:51:39.821251 env[1176]: time="2024-02-09T19:51:39.821205125Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:51:39.821325 env[1176]: time="2024-02-09T19:51:39.821305816Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692 pid=2555 runtime=io.containerd.runc.v2 Feb 9 19:51:39.837391 systemd[1]: Started cri-containerd-44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692.scope. Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.852000 audit: BPF prog-id=131 op=LOAD Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2555 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643836333866346565666635313839303465353531326631343365 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2555 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643836333866346565666635313839303465353531326631343365 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.855000 audit: BPF prog-id=132 op=LOAD Feb 9 19:51:39.855000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000194c30 items=0 ppid=2555 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643836333866346565666635313839303465353531326631343365 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit: BPF prog-id=133 op=LOAD Feb 9 19:51:39.856000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000194c78 items=0 ppid=2555 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643836333866346565666635313839303465353531326631343365 Feb 9 19:51:39.856000 audit: BPF prog-id=133 op=UNLOAD Feb 9 19:51:39.856000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:39.856000 audit: BPF prog-id=134 op=LOAD Feb 9 19:51:39.856000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000195088 items=0 ppid=2555 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:39.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643836333866346565666635313839303465353531326631343365 Feb 9 19:51:39.860832 env[1176]: time="2024-02-09T19:51:39.860801118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57957fd4fc-drqzt,Uid:24d5722e-4333-420f-825d-e95d0546e10d,Namespace:calico-system,Attempt:0,} returns sandbox id \"b3777e6199e1214e821f44fb8df46980182a38280ca859267a672c774232ca55\"" Feb 9 19:51:39.863003 env[1176]: time="2024-02-09T19:51:39.862980621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:51:39.871977 env[1176]: time="2024-02-09T19:51:39.871943691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nltrq,Uid:844a052d-5941-4560-9aa8-224ef8afc66f,Namespace:calico-system,Attempt:0,} returns sandbox id \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\"" Feb 9 19:51:40.351000 audit[2595]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:40.351000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffddc56c4a0 a2=0 a3=7ffddc56c48c items=0 ppid=2261 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:40.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:40.351000 audit[2595]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:40.351000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffddc56c4a0 a2=0 a3=31030 items=0 ppid=2261 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:40.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:41.205628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3994355216.mount: Deactivated successfully. Feb 9 19:51:41.582347 kubelet[2128]: E0209 19:51:41.582003 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:42.277095 env[1176]: time="2024-02-09T19:51:42.277063659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:42.278085 env[1176]: time="2024-02-09T19:51:42.278067689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:42.279056 env[1176]: time="2024-02-09T19:51:42.279040528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:42.280229 env[1176]: time="2024-02-09T19:51:42.280215270Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:42.280840 env[1176]: time="2024-02-09T19:51:42.280816385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:51:42.281605 env[1176]: time="2024-02-09T19:51:42.281480187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:51:42.291151 env[1176]: time="2024-02-09T19:51:42.291032950Z" level=info msg="CreateContainer within sandbox \"b3777e6199e1214e821f44fb8df46980182a38280ca859267a672c774232ca55\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:51:42.296201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2985231773.mount: Deactivated successfully. Feb 9 19:51:42.307381 env[1176]: time="2024-02-09T19:51:42.307351398Z" level=info msg="CreateContainer within sandbox \"b3777e6199e1214e821f44fb8df46980182a38280ca859267a672c774232ca55\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"32de707157ab38c51ce864449f57f96242517ec51178c18e24613a6a2078e92c\"" Feb 9 19:51:42.308022 env[1176]: time="2024-02-09T19:51:42.308003653Z" level=info msg="StartContainer for \"32de707157ab38c51ce864449f57f96242517ec51178c18e24613a6a2078e92c\"" Feb 9 19:51:42.320665 systemd[1]: Started cri-containerd-32de707157ab38c51ce864449f57f96242517ec51178c18e24613a6a2078e92c.scope. Feb 9 19:51:42.338048 kernel: kauditd_printk_skb: 239 callbacks suppressed Feb 9 19:51:42.338149 kernel: audit: type=1400 audit(1707508302.333:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.342933 kernel: audit: type=1400 audit(1707508302.333:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.348204 kernel: audit: type=1400 audit(1707508302.333:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.348266 kernel: audit: type=1400 audit(1707508302.333:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.351228 kernel: audit: type=1400 audit(1707508302.333:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.353745 kernel: audit: type=1400 audit(1707508302.333:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.356254 kernel: audit: type=1400 audit(1707508302.333:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.358758 kernel: audit: type=1400 audit(1707508302.333:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.361198 kernel: audit: type=1400 audit(1707508302.333:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.363703 kernel: audit: type=1400 audit(1707508302.337:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.337000 audit: BPF prog-id=135 op=LOAD Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2494 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:42.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646537303731353761623338633531636538363434343966353766 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2494 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:42.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646537303731353761623338633531636538363434343966353766 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit: BPF prog-id=136 op=LOAD Feb 9 19:51:42.338000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092a30 items=0 ppid=2494 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:42.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646537303731353761623338633531636538363434343966353766 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit: BPF prog-id=137 op=LOAD Feb 9 19:51:42.338000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092a78 items=0 ppid=2494 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:42.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646537303731353761623338633531636538363434343966353766 Feb 9 19:51:42.338000 audit: BPF prog-id=137 op=UNLOAD Feb 9 19:51:42.338000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:42.338000 audit: BPF prog-id=138 op=LOAD Feb 9 19:51:42.338000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000092e88 items=0 ppid=2494 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:42.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646537303731353761623338633531636538363434343966353766 Feb 9 19:51:42.376854 env[1176]: time="2024-02-09T19:51:42.376826159Z" level=info msg="StartContainer for \"32de707157ab38c51ce864449f57f96242517ec51178c18e24613a6a2078e92c\" returns successfully" Feb 9 19:51:42.705722 kubelet[2128]: E0209 19:51:42.705701 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.705995 kubelet[2128]: W0209 19:51:42.705978 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.706058 kubelet[2128]: E0209 19:51:42.706042 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.706205 kubelet[2128]: E0209 19:51:42.706193 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.706258 kubelet[2128]: W0209 19:51:42.706250 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.706303 kubelet[2128]: E0209 19:51:42.706297 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.706438 kubelet[2128]: E0209 19:51:42.706432 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.706482 kubelet[2128]: W0209 19:51:42.706474 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.706537 kubelet[2128]: E0209 19:51:42.706531 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.706678 kubelet[2128]: E0209 19:51:42.706665 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.706726 kubelet[2128]: W0209 19:51:42.706718 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.706771 kubelet[2128]: E0209 19:51:42.706765 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.706922 kubelet[2128]: E0209 19:51:42.706916 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.706975 kubelet[2128]: W0209 19:51:42.706968 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.707020 kubelet[2128]: E0209 19:51:42.707013 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.707146 kubelet[2128]: E0209 19:51:42.707141 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.707191 kubelet[2128]: W0209 19:51:42.707183 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.707243 kubelet[2128]: E0209 19:51:42.707237 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.707360 kubelet[2128]: E0209 19:51:42.707355 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.707410 kubelet[2128]: W0209 19:51:42.707403 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.707452 kubelet[2128]: E0209 19:51:42.707445 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.707596 kubelet[2128]: E0209 19:51:42.707591 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.707684 kubelet[2128]: W0209 19:51:42.707677 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.707729 kubelet[2128]: E0209 19:51:42.707722 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.707869 kubelet[2128]: E0209 19:51:42.707864 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.707931 kubelet[2128]: W0209 19:51:42.707924 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.707976 kubelet[2128]: E0209 19:51:42.707969 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.708105 kubelet[2128]: E0209 19:51:42.708099 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.708152 kubelet[2128]: W0209 19:51:42.708144 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.708206 kubelet[2128]: E0209 19:51:42.708198 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.708343 kubelet[2128]: E0209 19:51:42.708332 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.708387 kubelet[2128]: W0209 19:51:42.708380 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.708432 kubelet[2128]: E0209 19:51:42.708426 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.708571 kubelet[2128]: E0209 19:51:42.708565 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.708616 kubelet[2128]: W0209 19:51:42.708609 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.708668 kubelet[2128]: E0209 19:51:42.708662 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.708798 kubelet[2128]: E0209 19:51:42.708792 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.708849 kubelet[2128]: W0209 19:51:42.708842 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.708923 kubelet[2128]: E0209 19:51:42.708917 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.709063 kubelet[2128]: E0209 19:51:42.709056 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.709127 kubelet[2128]: W0209 19:51:42.709118 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.709170 kubelet[2128]: E0209 19:51:42.709164 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.709285 kubelet[2128]: E0209 19:51:42.709280 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.709329 kubelet[2128]: W0209 19:51:42.709322 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.709374 kubelet[2128]: E0209 19:51:42.709367 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.720498 kubelet[2128]: E0209 19:51:42.720490 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.720552 kubelet[2128]: W0209 19:51:42.720543 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.720600 kubelet[2128]: E0209 19:51:42.720593 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.720735 kubelet[2128]: E0209 19:51:42.720730 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.720782 kubelet[2128]: W0209 19:51:42.720774 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.720836 kubelet[2128]: E0209 19:51:42.720829 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721006 kubelet[2128]: E0209 19:51:42.720995 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721006 kubelet[2128]: W0209 19:51:42.721004 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721072 kubelet[2128]: E0209 19:51:42.721015 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721110 kubelet[2128]: E0209 19:51:42.721100 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721110 kubelet[2128]: W0209 19:51:42.721107 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721178 kubelet[2128]: E0209 19:51:42.721113 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721204 kubelet[2128]: E0209 19:51:42.721183 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721204 kubelet[2128]: W0209 19:51:42.721187 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721204 kubelet[2128]: E0209 19:51:42.721193 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721282 kubelet[2128]: E0209 19:51:42.721270 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721282 kubelet[2128]: W0209 19:51:42.721279 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721340 kubelet[2128]: E0209 19:51:42.721290 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721449 kubelet[2128]: E0209 19:51:42.721443 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721495 kubelet[2128]: W0209 19:51:42.721487 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721544 kubelet[2128]: E0209 19:51:42.721537 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721675 kubelet[2128]: E0209 19:51:42.721669 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721722 kubelet[2128]: W0209 19:51:42.721714 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721771 kubelet[2128]: E0209 19:51:42.721765 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.721899 kubelet[2128]: E0209 19:51:42.721893 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.721945 kubelet[2128]: W0209 19:51:42.721938 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.721995 kubelet[2128]: E0209 19:51:42.721988 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.722110 kubelet[2128]: E0209 19:51:42.722104 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.722158 kubelet[2128]: W0209 19:51:42.722150 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.722230 kubelet[2128]: E0209 19:51:42.722217 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.722360 kubelet[2128]: E0209 19:51:42.722352 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.722406 kubelet[2128]: W0209 19:51:42.722399 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.722472 kubelet[2128]: E0209 19:51:42.722462 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.722577 kubelet[2128]: E0209 19:51:42.722571 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.722621 kubelet[2128]: W0209 19:51:42.722614 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.722682 kubelet[2128]: E0209 19:51:42.722671 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.722827 kubelet[2128]: E0209 19:51:42.722821 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.722870 kubelet[2128]: W0209 19:51:42.722862 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.722931 kubelet[2128]: E0209 19:51:42.722924 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.723063 kubelet[2128]: E0209 19:51:42.723054 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.723063 kubelet[2128]: W0209 19:51:42.723060 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.723113 kubelet[2128]: E0209 19:51:42.723067 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.723143 kubelet[2128]: E0209 19:51:42.723129 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.723143 kubelet[2128]: W0209 19:51:42.723133 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.723143 kubelet[2128]: E0209 19:51:42.723139 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.723227 kubelet[2128]: E0209 19:51:42.723215 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.723227 kubelet[2128]: W0209 19:51:42.723223 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.723279 kubelet[2128]: E0209 19:51:42.723232 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.723390 kubelet[2128]: E0209 19:51:42.723383 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.723434 kubelet[2128]: W0209 19:51:42.723426 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.723490 kubelet[2128]: E0209 19:51:42.723483 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:42.723610 kubelet[2128]: E0209 19:51:42.723604 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:42.723659 kubelet[2128]: W0209 19:51:42.723651 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:42.723705 kubelet[2128]: E0209 19:51:42.723699 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.560499 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1149241511.mount: Deactivated successfully. Feb 9 19:51:43.581380 kubelet[2128]: E0209 19:51:43.581364 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:43.642349 kubelet[2128]: I0209 19:51:43.642329 2128 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:51:43.714193 kubelet[2128]: E0209 19:51:43.714171 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714193 kubelet[2128]: W0209 19:51:43.714186 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714193 kubelet[2128]: E0209 19:51:43.714200 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714475 kubelet[2128]: E0209 19:51:43.714286 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714475 kubelet[2128]: W0209 19:51:43.714291 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714475 kubelet[2128]: E0209 19:51:43.714297 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714475 kubelet[2128]: E0209 19:51:43.714362 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714475 kubelet[2128]: W0209 19:51:43.714366 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714475 kubelet[2128]: E0209 19:51:43.714371 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714475 kubelet[2128]: E0209 19:51:43.714438 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714475 kubelet[2128]: W0209 19:51:43.714442 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714475 kubelet[2128]: E0209 19:51:43.714448 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714685 kubelet[2128]: E0209 19:51:43.714515 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714685 kubelet[2128]: W0209 19:51:43.714519 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714685 kubelet[2128]: E0209 19:51:43.714525 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714685 kubelet[2128]: E0209 19:51:43.714585 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714685 kubelet[2128]: W0209 19:51:43.714589 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714685 kubelet[2128]: E0209 19:51:43.714594 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714685 kubelet[2128]: E0209 19:51:43.714654 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714685 kubelet[2128]: W0209 19:51:43.714657 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714685 kubelet[2128]: E0209 19:51:43.714662 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714840 kubelet[2128]: E0209 19:51:43.714721 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714840 kubelet[2128]: W0209 19:51:43.714725 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714840 kubelet[2128]: E0209 19:51:43.714731 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714840 kubelet[2128]: E0209 19:51:43.714798 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714840 kubelet[2128]: W0209 19:51:43.714802 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714840 kubelet[2128]: E0209 19:51:43.714807 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714980 kubelet[2128]: E0209 19:51:43.714865 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714980 kubelet[2128]: W0209 19:51:43.714869 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714980 kubelet[2128]: E0209 19:51:43.714874 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.714980 kubelet[2128]: E0209 19:51:43.714949 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.714980 kubelet[2128]: W0209 19:51:43.714953 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.714980 kubelet[2128]: E0209 19:51:43.714959 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.715086 kubelet[2128]: E0209 19:51:43.715019 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.715086 kubelet[2128]: W0209 19:51:43.715023 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.715086 kubelet[2128]: E0209 19:51:43.715029 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.715143 kubelet[2128]: E0209 19:51:43.715092 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.715143 kubelet[2128]: W0209 19:51:43.715095 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.715143 kubelet[2128]: E0209 19:51:43.715100 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.715196 kubelet[2128]: E0209 19:51:43.715163 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.715196 kubelet[2128]: W0209 19:51:43.715180 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.715196 kubelet[2128]: E0209 19:51:43.715189 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.715266 kubelet[2128]: E0209 19:51:43.715257 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.715266 kubelet[2128]: W0209 19:51:43.715263 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.715320 kubelet[2128]: E0209 19:51:43.715268 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.726389 kubelet[2128]: E0209 19:51:43.726372 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.726504 kubelet[2128]: W0209 19:51:43.726494 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.726565 kubelet[2128]: E0209 19:51:43.726552 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.726725 kubelet[2128]: E0209 19:51:43.726719 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.726781 kubelet[2128]: W0209 19:51:43.726773 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.726828 kubelet[2128]: E0209 19:51:43.726821 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.726999 kubelet[2128]: E0209 19:51:43.726985 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.726999 kubelet[2128]: W0209 19:51:43.726996 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727067 kubelet[2128]: E0209 19:51:43.727009 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727126 kubelet[2128]: E0209 19:51:43.727113 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727126 kubelet[2128]: W0209 19:51:43.727121 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727126 kubelet[2128]: E0209 19:51:43.727129 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727286 kubelet[2128]: E0209 19:51:43.727277 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727286 kubelet[2128]: W0209 19:51:43.727283 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727342 kubelet[2128]: E0209 19:51:43.727292 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727392 kubelet[2128]: E0209 19:51:43.727382 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727392 kubelet[2128]: W0209 19:51:43.727390 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727449 kubelet[2128]: E0209 19:51:43.727401 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727561 kubelet[2128]: E0209 19:51:43.727553 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727561 kubelet[2128]: W0209 19:51:43.727560 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727614 kubelet[2128]: E0209 19:51:43.727568 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727657 kubelet[2128]: E0209 19:51:43.727647 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727657 kubelet[2128]: W0209 19:51:43.727653 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727709 kubelet[2128]: E0209 19:51:43.727661 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727767 kubelet[2128]: E0209 19:51:43.727758 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727767 kubelet[2128]: W0209 19:51:43.727764 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727825 kubelet[2128]: E0209 19:51:43.727772 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.727851 kubelet[2128]: E0209 19:51:43.727840 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.727851 kubelet[2128]: W0209 19:51:43.727844 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.727851 kubelet[2128]: E0209 19:51:43.727849 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728039 kubelet[2128]: E0209 19:51:43.728029 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728039 kubelet[2128]: W0209 19:51:43.728037 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728115 kubelet[2128]: E0209 19:51:43.728106 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728115 kubelet[2128]: W0209 19:51:43.728111 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728174 kubelet[2128]: E0209 19:51:43.728117 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728211 kubelet[2128]: E0209 19:51:43.728203 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728321 kubelet[2128]: E0209 19:51:43.728313 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728321 kubelet[2128]: W0209 19:51:43.728318 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728380 kubelet[2128]: E0209 19:51:43.728327 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728413 kubelet[2128]: E0209 19:51:43.728404 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728413 kubelet[2128]: W0209 19:51:43.728410 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728464 kubelet[2128]: E0209 19:51:43.728421 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728517 kubelet[2128]: E0209 19:51:43.728508 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728517 kubelet[2128]: W0209 19:51:43.728513 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728563 kubelet[2128]: E0209 19:51:43.728521 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728766 kubelet[2128]: E0209 19:51:43.728756 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728795 kubelet[2128]: W0209 19:51:43.728764 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728795 kubelet[2128]: E0209 19:51:43.728777 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.728961 kubelet[2128]: E0209 19:51:43.728867 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.728961 kubelet[2128]: W0209 19:51:43.728874 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.728961 kubelet[2128]: E0209 19:51:43.728889 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:43.729039 kubelet[2128]: E0209 19:51:43.729029 2128 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:51:43.729039 kubelet[2128]: W0209 19:51:43.729035 2128 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:51:43.729086 kubelet[2128]: E0209 19:51:43.729041 2128 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:51:44.745694 env[1176]: time="2024-02-09T19:51:44.745653661Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:44.746431 env[1176]: time="2024-02-09T19:51:44.746416622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:44.747994 env[1176]: time="2024-02-09T19:51:44.747977545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:44.749062 env[1176]: time="2024-02-09T19:51:44.749044724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:44.749659 env[1176]: time="2024-02-09T19:51:44.749641401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:51:44.752388 env[1176]: time="2024-02-09T19:51:44.752369214Z" level=info msg="CreateContainer within sandbox \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:51:44.757658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2800204245.mount: Deactivated successfully. Feb 9 19:51:44.769870 env[1176]: time="2024-02-09T19:51:44.769838835Z" level=info msg="CreateContainer within sandbox \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5\"" Feb 9 19:51:44.770198 env[1176]: time="2024-02-09T19:51:44.770172132Z" level=info msg="StartContainer for \"e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5\"" Feb 9 19:51:44.788855 systemd[1]: Started cri-containerd-e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5.scope. Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2555 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:44.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383636363639363663363339396336653064386265356331356133 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.799000 audit: BPF prog-id=139 op=LOAD Feb 9 19:51:44.799000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c2070 items=0 ppid=2555 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:44.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383636363639363663363339396336653064386265356331356133 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.800000 audit: BPF prog-id=140 op=LOAD Feb 9 19:51:44.800000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c20b8 items=0 ppid=2555 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:44.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383636363639363663363339396336653064386265356331356133 Feb 9 19:51:44.801000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:51:44.801000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:44.801000 audit: BPF prog-id=141 op=LOAD Feb 9 19:51:44.801000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c2148 items=0 ppid=2555 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:44.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383636363639363663363339396336653064386265356331356133 Feb 9 19:51:44.814970 env[1176]: time="2024-02-09T19:51:44.814940255Z" level=info msg="StartContainer for \"e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5\" returns successfully" Feb 9 19:51:44.821574 systemd[1]: cri-containerd-e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5.scope: Deactivated successfully. Feb 9 19:51:44.824000 audit: BPF prog-id=141 op=UNLOAD Feb 9 19:51:44.892472 env[1176]: time="2024-02-09T19:51:44.892424775Z" level=info msg="shim disconnected" id=e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5 Feb 9 19:51:44.892472 env[1176]: time="2024-02-09T19:51:44.892467867Z" level=warning msg="cleaning up after shim disconnected" id=e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5 namespace=k8s.io Feb 9 19:51:44.892472 env[1176]: time="2024-02-09T19:51:44.892477490Z" level=info msg="cleaning up dead shim" Feb 9 19:51:44.898517 env[1176]: time="2024-02-09T19:51:44.898477701Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:51:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2751 runtime=io.containerd.runc.v2\n" Feb 9 19:51:45.582370 kubelet[2128]: E0209 19:51:45.582342 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:45.646419 env[1176]: time="2024-02-09T19:51:45.646391383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:51:45.655242 kubelet[2128]: I0209 19:51:45.655220 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-57957fd4fc-drqzt" podStartSLOduration=4.236943248 podCreationTimestamp="2024-02-09 19:51:39 +0000 UTC" firstStartedPulling="2024-02-09 19:51:39.862792887 +0000 UTC m=+20.356046959" lastFinishedPulling="2024-02-09 19:51:42.281048859 +0000 UTC m=+22.774302930" observedRunningTime="2024-02-09 19:51:42.649185757 +0000 UTC m=+23.142439840" watchObservedRunningTime="2024-02-09 19:51:45.655199219 +0000 UTC m=+26.148453296" Feb 9 19:51:45.756619 systemd[1]: run-containerd-runc-k8s.io-e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5-runc.ROtNSm.mount: Deactivated successfully. Feb 9 19:51:45.756699 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e286666966c6399c6e0d8be5c15a353769e84a066d7f8930d643d5a7645be9e5-rootfs.mount: Deactivated successfully. Feb 9 19:51:47.105048 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount166329787.mount: Deactivated successfully. Feb 9 19:51:47.581086 kubelet[2128]: E0209 19:51:47.580727 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:49.536374 kubelet[2128]: I0209 19:51:49.536324 2128 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:51:49.582320 kubelet[2128]: E0209 19:51:49.582299 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:49.588000 audit[2768]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:49.590127 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 9 19:51:49.590169 kernel: audit: type=1325 audit(1707508309.588:1130): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:49.588000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff1bf23410 a2=0 a3=7fff1bf233fc items=0 ppid=2261 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:49.596009 kernel: audit: type=1300 audit(1707508309.588:1130): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff1bf23410 a2=0 a3=7fff1bf233fc items=0 ppid=2261 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:49.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:49.597910 kernel: audit: type=1327 audit(1707508309.588:1130): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:49.592000 audit[2768]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:49.592000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fff1bf23410 a2=0 a3=7fff1bf233fc items=0 ppid=2261 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:49.606896 kernel: audit: type=1325 audit(1707508309.592:1131): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:51:49.606926 kernel: audit: type=1300 audit(1707508309.592:1131): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fff1bf23410 a2=0 a3=7fff1bf233fc items=0 ppid=2261 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:49.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:49.608776 kernel: audit: type=1327 audit(1707508309.592:1131): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:51:51.581635 kubelet[2128]: E0209 19:51:51.581614 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:52.725993 env[1176]: time="2024-02-09T19:51:52.725948857Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:52.761097 env[1176]: time="2024-02-09T19:51:52.761068862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:52.772487 env[1176]: time="2024-02-09T19:51:52.772463711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:52.777126 env[1176]: time="2024-02-09T19:51:52.777101091Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:52.777579 env[1176]: time="2024-02-09T19:51:52.777561192Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:51:52.780118 env[1176]: time="2024-02-09T19:51:52.780098073Z" level=info msg="CreateContainer within sandbox \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:51:52.809914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2648796831.mount: Deactivated successfully. Feb 9 19:51:52.825088 env[1176]: time="2024-02-09T19:51:52.825050965Z" level=info msg="CreateContainer within sandbox \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f\"" Feb 9 19:51:52.828839 env[1176]: time="2024-02-09T19:51:52.828814581Z" level=info msg="StartContainer for \"988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f\"" Feb 9 19:51:52.841551 systemd[1]: Started cri-containerd-988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f.scope. Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2555 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:52.863120 kernel: audit: type=1400 audit(1707508312.856:1132): avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.863234 kernel: audit: type=1300 audit(1707508312.856:1132): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2555 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:52.866454 kernel: audit: type=1327 audit(1707508312.856:1132): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383738363631396437373636333636383561366238653435313339 Feb 9 19:51:52.868890 kernel: audit: type=1400 audit(1707508312.856:1133): avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383738363631396437373636333636383561366238653435313339 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.856000 audit: BPF prog-id=142 op=LOAD Feb 9 19:51:52.856000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000218200 items=0 ppid=2555 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:52.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383738363631396437373636333636383561366238653435313339 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.858000 audit: BPF prog-id=143 op=LOAD Feb 9 19:51:52.858000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000218248 items=0 ppid=2555 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:52.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383738363631396437373636333636383561366238653435313339 Feb 9 19:51:52.865000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:51:52.865000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:52.865000 audit: BPF prog-id=144 op=LOAD Feb 9 19:51:52.865000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002182d8 items=0 ppid=2555 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:52.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938383738363631396437373636333636383561366238653435313339 Feb 9 19:51:52.883231 env[1176]: time="2024-02-09T19:51:52.883206867Z" level=info msg="StartContainer for \"988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f\" returns successfully" Feb 9 19:51:53.581716 kubelet[2128]: E0209 19:51:53.581695 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:54.360297 env[1176]: time="2024-02-09T19:51:54.360251812Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:51:54.362472 systemd[1]: cri-containerd-988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f.scope: Deactivated successfully. Feb 9 19:51:54.365000 audit: BPF prog-id=144 op=UNLOAD Feb 9 19:51:54.373623 kubelet[2128]: I0209 19:51:54.373601 2128 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:51:54.376514 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f-rootfs.mount: Deactivated successfully. Feb 9 19:51:54.382077 env[1176]: time="2024-02-09T19:51:54.381331022Z" level=info msg="shim disconnected" id=988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f Feb 9 19:51:54.382077 env[1176]: time="2024-02-09T19:51:54.381372209Z" level=warning msg="cleaning up after shim disconnected" id=988786619d776636685a6b8e451393ab4247a0a68e836a04c64465c70ccb610f namespace=k8s.io Feb 9 19:51:54.382077 env[1176]: time="2024-02-09T19:51:54.381381818Z" level=info msg="cleaning up dead shim" Feb 9 19:51:54.390093 env[1176]: time="2024-02-09T19:51:54.390059697Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:51:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2823 runtime=io.containerd.runc.v2\n" Feb 9 19:51:54.418094 kubelet[2128]: I0209 19:51:54.417444 2128 topology_manager.go:215] "Topology Admit Handler" podUID="59088987-6760-402f-834f-69e3c4081260" podNamespace="kube-system" podName="coredns-5dd5756b68-d549n" Feb 9 19:51:54.418094 kubelet[2128]: I0209 19:51:54.417587 2128 topology_manager.go:215] "Topology Admit Handler" podUID="b5fbc0e3-62ee-4617-a6f6-319ede7bee78" podNamespace="calico-system" podName="calico-kube-controllers-844cbb97c5-7k5nj" Feb 9 19:51:54.418094 kubelet[2128]: I0209 19:51:54.417663 2128 topology_manager.go:215] "Topology Admit Handler" podUID="e85eedc0-1b5c-4171-ad51-e0dd673d46dc" podNamespace="kube-system" podName="coredns-5dd5756b68-dz8pl" Feb 9 19:51:54.424472 systemd[1]: Created slice kubepods-burstable-pode85eedc0_1b5c_4171_ad51_e0dd673d46dc.slice. Feb 9 19:51:54.428603 systemd[1]: Created slice kubepods-burstable-pod59088987_6760_402f_834f_69e3c4081260.slice. Feb 9 19:51:54.433476 systemd[1]: Created slice kubepods-besteffort-podb5fbc0e3_62ee_4617_a6f6_319ede7bee78.slice. Feb 9 19:51:54.494720 kubelet[2128]: I0209 19:51:54.494696 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e85eedc0-1b5c-4171-ad51-e0dd673d46dc-config-volume\") pod \"coredns-5dd5756b68-dz8pl\" (UID: \"e85eedc0-1b5c-4171-ad51-e0dd673d46dc\") " pod="kube-system/coredns-5dd5756b68-dz8pl" Feb 9 19:51:54.494720 kubelet[2128]: I0209 19:51:54.494724 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhcgn\" (UniqueName: \"kubernetes.io/projected/e85eedc0-1b5c-4171-ad51-e0dd673d46dc-kube-api-access-bhcgn\") pod \"coredns-5dd5756b68-dz8pl\" (UID: \"e85eedc0-1b5c-4171-ad51-e0dd673d46dc\") " pod="kube-system/coredns-5dd5756b68-dz8pl" Feb 9 19:51:54.494845 kubelet[2128]: I0209 19:51:54.494740 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/59088987-6760-402f-834f-69e3c4081260-config-volume\") pod \"coredns-5dd5756b68-d549n\" (UID: \"59088987-6760-402f-834f-69e3c4081260\") " pod="kube-system/coredns-5dd5756b68-d549n" Feb 9 19:51:54.494845 kubelet[2128]: I0209 19:51:54.494753 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xrxdt\" (UniqueName: \"kubernetes.io/projected/b5fbc0e3-62ee-4617-a6f6-319ede7bee78-kube-api-access-xrxdt\") pod \"calico-kube-controllers-844cbb97c5-7k5nj\" (UID: \"b5fbc0e3-62ee-4617-a6f6-319ede7bee78\") " pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" Feb 9 19:51:54.494845 kubelet[2128]: I0209 19:51:54.494770 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5fbc0e3-62ee-4617-a6f6-319ede7bee78-tigera-ca-bundle\") pod \"calico-kube-controllers-844cbb97c5-7k5nj\" (UID: \"b5fbc0e3-62ee-4617-a6f6-319ede7bee78\") " pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" Feb 9 19:51:54.494845 kubelet[2128]: I0209 19:51:54.494790 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mm7n\" (UniqueName: \"kubernetes.io/projected/59088987-6760-402f-834f-69e3c4081260-kube-api-access-7mm7n\") pod \"coredns-5dd5756b68-d549n\" (UID: \"59088987-6760-402f-834f-69e3c4081260\") " pod="kube-system/coredns-5dd5756b68-d549n" Feb 9 19:51:54.668908 env[1176]: time="2024-02-09T19:51:54.666966666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:51:54.728325 env[1176]: time="2024-02-09T19:51:54.728299069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-dz8pl,Uid:e85eedc0-1b5c-4171-ad51-e0dd673d46dc,Namespace:kube-system,Attempt:0,}" Feb 9 19:51:54.735907 env[1176]: time="2024-02-09T19:51:54.735466100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-d549n,Uid:59088987-6760-402f-834f-69e3c4081260,Namespace:kube-system,Attempt:0,}" Feb 9 19:51:54.736891 env[1176]: time="2024-02-09T19:51:54.736346377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-844cbb97c5-7k5nj,Uid:b5fbc0e3-62ee-4617-a6f6-319ede7bee78,Namespace:calico-system,Attempt:0,}" Feb 9 19:51:54.810526 env[1176]: time="2024-02-09T19:51:54.810482101Z" level=error msg="Failed to destroy network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.810745 env[1176]: time="2024-02-09T19:51:54.810724407Z" level=error msg="encountered an error cleaning up failed sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.810789 env[1176]: time="2024-02-09T19:51:54.810758573Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-dz8pl,Uid:e85eedc0-1b5c-4171-ad51-e0dd673d46dc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.812159 kubelet[2128]: E0209 19:51:54.812143 2128 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.812349 kubelet[2128]: E0209 19:51:54.812186 2128 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-dz8pl" Feb 9 19:51:54.812349 kubelet[2128]: E0209 19:51:54.812213 2128 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-dz8pl" Feb 9 19:51:54.812349 kubelet[2128]: E0209 19:51:54.812279 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-dz8pl_kube-system(e85eedc0-1b5c-4171-ad51-e0dd673d46dc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-dz8pl_kube-system(e85eedc0-1b5c-4171-ad51-e0dd673d46dc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-dz8pl" podUID="e85eedc0-1b5c-4171-ad51-e0dd673d46dc" Feb 9 19:51:54.818294 env[1176]: time="2024-02-09T19:51:54.818263156Z" level=error msg="Failed to destroy network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.818508 env[1176]: time="2024-02-09T19:51:54.818489156Z" level=error msg="encountered an error cleaning up failed sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.818561 env[1176]: time="2024-02-09T19:51:54.818523142Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-d549n,Uid:59088987-6760-402f-834f-69e3c4081260,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.818683 kubelet[2128]: E0209 19:51:54.818667 2128 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.818742 kubelet[2128]: E0209 19:51:54.818707 2128 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-d549n" Feb 9 19:51:54.818742 kubelet[2128]: E0209 19:51:54.818721 2128 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-d549n" Feb 9 19:51:54.818792 kubelet[2128]: E0209 19:51:54.818769 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-d549n_kube-system(59088987-6760-402f-834f-69e3c4081260)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-d549n_kube-system(59088987-6760-402f-834f-69e3c4081260)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-d549n" podUID="59088987-6760-402f-834f-69e3c4081260" Feb 9 19:51:54.821975 env[1176]: time="2024-02-09T19:51:54.821951343Z" level=error msg="Failed to destroy network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.822239 env[1176]: time="2024-02-09T19:51:54.822221401Z" level=error msg="encountered an error cleaning up failed sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.822318 env[1176]: time="2024-02-09T19:51:54.822302083Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-844cbb97c5-7k5nj,Uid:b5fbc0e3-62ee-4617-a6f6-319ede7bee78,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.823199 kubelet[2128]: E0209 19:51:54.822500 2128 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:54.823199 kubelet[2128]: E0209 19:51:54.822527 2128 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" Feb 9 19:51:54.823199 kubelet[2128]: E0209 19:51:54.822540 2128 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" Feb 9 19:51:54.823305 kubelet[2128]: E0209 19:51:54.822574 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-844cbb97c5-7k5nj_calico-system(b5fbc0e3-62ee-4617-a6f6-319ede7bee78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-844cbb97c5-7k5nj_calico-system(b5fbc0e3-62ee-4617-a6f6-319ede7bee78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" podUID="b5fbc0e3-62ee-4617-a6f6-319ede7bee78" Feb 9 19:51:55.377744 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e-shm.mount: Deactivated successfully. Feb 9 19:51:55.585326 systemd[1]: Created slice kubepods-besteffort-pod54d1291f_fe29_442a_b31e_c69d6ea59d02.slice. Feb 9 19:51:55.587355 env[1176]: time="2024-02-09T19:51:55.587334284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4kpxb,Uid:54d1291f-fe29-442a-b31e-c69d6ea59d02,Namespace:calico-system,Attempt:0,}" Feb 9 19:51:55.667973 kubelet[2128]: I0209 19:51:55.667429 2128 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:51:55.669139 kubelet[2128]: I0209 19:51:55.668929 2128 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:51:55.675914 kubelet[2128]: I0209 19:51:55.675626 2128 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:51:55.687587 env[1176]: time="2024-02-09T19:51:55.687548866Z" level=error msg="Failed to destroy network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.688742 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677-shm.mount: Deactivated successfully. Feb 9 19:51:55.689420 env[1176]: time="2024-02-09T19:51:55.689401315Z" level=info msg="StopPodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\"" Feb 9 19:51:55.689676 env[1176]: time="2024-02-09T19:51:55.689662557Z" level=info msg="StopPodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\"" Feb 9 19:51:55.690051 env[1176]: time="2024-02-09T19:51:55.690022818Z" level=error msg="encountered an error cleaning up failed sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.690148 env[1176]: time="2024-02-09T19:51:55.690115712Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4kpxb,Uid:54d1291f-fe29-442a-b31e-c69d6ea59d02,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.690223 env[1176]: time="2024-02-09T19:51:55.690098995Z" level=info msg="StopPodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\"" Feb 9 19:51:55.690684 kubelet[2128]: E0209 19:51:55.690441 2128 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.690684 kubelet[2128]: E0209 19:51:55.690471 2128 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:55.690684 kubelet[2128]: E0209 19:51:55.690484 2128 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4kpxb" Feb 9 19:51:55.690793 kubelet[2128]: E0209 19:51:55.690524 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-4kpxb_calico-system(54d1291f-fe29-442a-b31e-c69d6ea59d02)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-4kpxb_calico-system(54d1291f-fe29-442a-b31e-c69d6ea59d02)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:55.714801 env[1176]: time="2024-02-09T19:51:55.714765644Z" level=error msg="StopPodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" failed" error="failed to destroy network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.715169 kubelet[2128]: E0209 19:51:55.715096 2128 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:51:55.715752 env[1176]: time="2024-02-09T19:51:55.715726411Z" level=error msg="StopPodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" failed" error="failed to destroy network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.715830 kubelet[2128]: E0209 19:51:55.715814 2128 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:51:55.726860 kubelet[2128]: E0209 19:51:55.726750 2128 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e"} Feb 9 19:51:55.726860 kubelet[2128]: E0209 19:51:55.726779 2128 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e85eedc0-1b5c-4171-ad51-e0dd673d46dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:51:55.726860 kubelet[2128]: E0209 19:51:55.726807 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e85eedc0-1b5c-4171-ad51-e0dd673d46dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-dz8pl" podUID="e85eedc0-1b5c-4171-ad51-e0dd673d46dc" Feb 9 19:51:55.726860 kubelet[2128]: E0209 19:51:55.726820 2128 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac"} Feb 9 19:51:55.726860 kubelet[2128]: E0209 19:51:55.726836 2128 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b5fbc0e3-62ee-4617-a6f6-319ede7bee78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:51:55.727079 kubelet[2128]: E0209 19:51:55.726849 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b5fbc0e3-62ee-4617-a6f6-319ede7bee78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" podUID="b5fbc0e3-62ee-4617-a6f6-319ede7bee78" Feb 9 19:51:55.735345 env[1176]: time="2024-02-09T19:51:55.735281173Z" level=error msg="StopPodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" failed" error="failed to destroy network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:55.735575 kubelet[2128]: E0209 19:51:55.735490 2128 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:51:55.735575 kubelet[2128]: E0209 19:51:55.735524 2128 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368"} Feb 9 19:51:55.735575 kubelet[2128]: E0209 19:51:55.735546 2128 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"59088987-6760-402f-834f-69e3c4081260\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:51:55.735575 kubelet[2128]: E0209 19:51:55.735562 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"59088987-6760-402f-834f-69e3c4081260\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-d549n" podUID="59088987-6760-402f-834f-69e3c4081260" Feb 9 19:51:56.681725 kubelet[2128]: I0209 19:51:56.681693 2128 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:51:56.683408 env[1176]: time="2024-02-09T19:51:56.682962288Z" level=info msg="StopPodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\"" Feb 9 19:51:56.698251 env[1176]: time="2024-02-09T19:51:56.698211398Z" level=error msg="StopPodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" failed" error="failed to destroy network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:51:56.698381 kubelet[2128]: E0209 19:51:56.698356 2128 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:51:56.701038 kubelet[2128]: E0209 19:51:56.698394 2128 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677"} Feb 9 19:51:56.701038 kubelet[2128]: E0209 19:51:56.698415 2128 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"54d1291f-fe29-442a-b31e-c69d6ea59d02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:51:56.701038 kubelet[2128]: E0209 19:51:56.698433 2128 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"54d1291f-fe29-442a-b31e-c69d6ea59d02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4kpxb" podUID="54d1291f-fe29-442a-b31e-c69d6ea59d02" Feb 9 19:51:59.683659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1071644900.mount: Deactivated successfully. Feb 9 19:51:59.797305 env[1176]: time="2024-02-09T19:51:59.797245890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:59.798353 env[1176]: time="2024-02-09T19:51:59.798331485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:59.799452 env[1176]: time="2024-02-09T19:51:59.799431188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:59.801370 env[1176]: time="2024-02-09T19:51:59.800540044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:51:59.801370 env[1176]: time="2024-02-09T19:51:59.800959907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:51:59.866236 env[1176]: time="2024-02-09T19:51:59.866191769Z" level=info msg="CreateContainer within sandbox \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:51:59.884364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount934417226.mount: Deactivated successfully. Feb 9 19:51:59.888701 env[1176]: time="2024-02-09T19:51:59.888661225Z" level=info msg="CreateContainer within sandbox \"44d8638f4eeff518904e5512f143e9a10ac3d923597477ae26ad688912065692\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1\"" Feb 9 19:51:59.890015 env[1176]: time="2024-02-09T19:51:59.889995407Z" level=info msg="StartContainer for \"23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1\"" Feb 9 19:51:59.902626 systemd[1]: Started cri-containerd-23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1.scope. Feb 9 19:51:59.921844 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 19:51:59.932090 kernel: audit: type=1400 audit(1707508319.917:1139): avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.932163 kernel: audit: type=1300 audit(1707508319.917:1139): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2555 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:59.932184 kernel: audit: type=1327 audit(1707508319.917:1139): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323238626663393338653034396638323962386137343034386433 Feb 9 19:51:59.932203 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.934747 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.917000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.938306 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.917000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2555 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:59.941269 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323238626663393338653034396638323962386137343034386433 Feb 9 19:51:59.944082 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.946932 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.949900 kernel: audit: type=1400 audit(1707508319.921:1140): avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.921000 audit: BPF prog-id=145 op=LOAD Feb 9 19:51:59.921000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000ffc70 items=0 ppid=2555 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:59.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323238626663393338653034396638323962386137343034386433 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit: BPF prog-id=146 op=LOAD Feb 9 19:51:59.925000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000ffcb8 items=0 ppid=2555 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:59.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323238626663393338653034396638323962386137343034386433 Feb 9 19:51:59.925000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:51:59.925000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:51:59.925000 audit: BPF prog-id=147 op=LOAD Feb 9 19:51:59.925000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000ffd48 items=0 ppid=2555 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:51:59.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233323238626663393338653034396638323962386137343034386433 Feb 9 19:51:59.953692 env[1176]: time="2024-02-09T19:51:59.953664702Z" level=info msg="StartContainer for \"23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1\" returns successfully" Feb 9 19:52:00.364988 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:52:00.365074 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:52:00.748446 systemd[1]: run-containerd-runc-k8s.io-23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1-runc.cJOpZr.mount: Deactivated successfully. Feb 9 19:52:00.758512 kubelet[2128]: I0209 19:52:00.758487 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-nltrq" podStartSLOduration=1.825779678 podCreationTimestamp="2024-02-09 19:51:39 +0000 UTC" firstStartedPulling="2024-02-09 19:51:39.872630779 +0000 UTC m=+20.365884850" lastFinishedPulling="2024-02-09 19:51:59.801138554 +0000 UTC m=+40.294392634" observedRunningTime="2024-02-09 19:52:00.752927005 +0000 UTC m=+41.246181090" watchObservedRunningTime="2024-02-09 19:52:00.754287462 +0000 UTC m=+41.247541541" Feb 9 19:52:01.748291 systemd[1]: run-containerd-runc-k8s.io-23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1-runc.rmKLgG.mount: Deactivated successfully. Feb 9 19:52:01.789000 audit[3207]: AVC avc: denied { write } for pid=3207 comm="tee" name="fd" dev="proc" ino=35546 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.789000 audit[3207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4c7e097f a2=241 a3=1b6 items=1 ppid=3172 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.789000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:52:01.789000 audit: PATH item=0 name="/dev/fd/63" inode=35543 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.789000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:01.809000 audit[3219]: AVC avc: denied { write } for pid=3219 comm="tee" name="fd" dev="proc" ino=35571 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.809000 audit[3219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbd0eb98f a2=241 a3=1b6 items=1 ppid=3168 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.809000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:52:01.809000 audit: PATH item=0 name="/dev/fd/63" inode=35557 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:01.813000 audit[3221]: AVC avc: denied { write } for pid=3221 comm="tee" name="fd" dev="proc" ino=35579 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.813000 audit[3221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec9ada98f a2=241 a3=1b6 items=1 ppid=3161 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.813000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:52:01.813000 audit: PATH item=0 name="/dev/fd/63" inode=35560 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.813000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:01.829000 audit[3226]: AVC avc: denied { write } for pid=3226 comm="tee" name="fd" dev="proc" ino=34239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.829000 audit[3226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc07f74990 a2=241 a3=1b6 items=1 ppid=3177 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.829000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:52:01.829000 audit: PATH item=0 name="/dev/fd/63" inode=35565 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:01.827000 audit[3230]: AVC avc: denied { write } for pid=3230 comm="tee" name="fd" dev="proc" ino=34244 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.827000 audit[3230]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4ffd7991 a2=241 a3=1b6 items=1 ppid=3185 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.827000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:52:01.827000 audit: PATH item=0 name="/dev/fd/63" inode=35568 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.827000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:01.833000 audit[3240]: AVC avc: denied { write } for pid=3240 comm="tee" name="fd" dev="proc" ino=34250 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.833000 audit[3238]: AVC avc: denied { write } for pid=3238 comm="tee" name="fd" dev="proc" ino=34251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:52:01.833000 audit[3238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2b1ed980 a2=241 a3=1b6 items=1 ppid=3190 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.833000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:52:01.833000 audit: PATH item=0 name="/dev/fd/63" inode=34236 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:01.833000 audit[3240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf97d398f a2=241 a3=1b6 items=1 ppid=3174 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:01.833000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:52:01.833000 audit: PATH item=0 name="/dev/fd/63" inode=34242 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:01.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit: BPF prog-id=148 op=LOAD Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb7c99310 a2=70 a3=7fcc71ab9000 items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit: BPF prog-id=149 op=LOAD Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb7c99310 a2=70 a3=6e items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcb7c992c0 a2=70 a3=7ffcb7c99310 items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit: BPF prog-id=150 op=LOAD Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcb7c992a0 a2=70 a3=7ffcb7c99310 items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit: BPF prog-id=150 op=UNLOAD Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7c99380 a2=70 a3=0 items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7c99370 a2=70 a3=0 items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcb7c993b0 a2=70 a3=0 items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.241000 audit: BPF prog-id=151 op=LOAD Feb 9 19:52:02.241000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcb7c992d0 a2=70 a3=ffffffff items=0 ppid=3175 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:52:02.243000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.243000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff52b5bf00 a2=70 a3=fff80800 items=0 ppid=3175 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:52:02.243000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:02.243000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff52b5bdd0 a2=70 a3=3 items=0 ppid=3175 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:52:02.249000 audit: BPF prog-id=151 op=UNLOAD Feb 9 19:52:02.343000 audit[3335]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:02.343000 audit[3335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffeca8e7b00 a2=0 a3=7ffeca8e7aec items=0 ppid=3175 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:02.350000 audit[3334]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:02.350000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc0c8e3900 a2=0 a3=564ce4bc3000 items=0 ppid=3175 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.350000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:02.355000 audit[3339]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:02.355000 audit[3339]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff2fd4a460 a2=0 a3=556323e5e000 items=0 ppid=3175 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.355000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:02.355000 audit[3338]: NETFILTER_CFG table=nat:100 family=2 entries=16 op=nft_register_chain pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:02.355000 audit[3338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd5be051c0 a2=0 a3=5643e796c000 items=0 ppid=3175 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:02.355000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:02.753562 systemd[1]: run-containerd-runc-k8s.io-23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1-runc.BnYhvT.mount: Deactivated successfully. Feb 9 19:52:03.023569 systemd-networkd[1065]: vxlan.calico: Link UP Feb 9 19:52:03.023574 systemd-networkd[1065]: vxlan.calico: Gained carrier Feb 9 19:52:04.463985 systemd-networkd[1065]: vxlan.calico: Gained IPv6LL Feb 9 19:52:06.581174 env[1176]: time="2024-02-09T19:52:06.581138772Z" level=info msg="StopPodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\"" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.630 [INFO][3399] k8s.go 578: Cleaning up netns ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.630 [INFO][3399] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" iface="eth0" netns="/var/run/netns/cni-19ed8958-7aac-e153-533f-d7bf2d2fda29" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.631 [INFO][3399] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" iface="eth0" netns="/var/run/netns/cni-19ed8958-7aac-e153-533f-d7bf2d2fda29" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.632 [INFO][3399] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" iface="eth0" netns="/var/run/netns/cni-19ed8958-7aac-e153-533f-d7bf2d2fda29" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.632 [INFO][3399] k8s.go 585: Releasing IP address(es) ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.632 [INFO][3399] utils.go 188: Calico CNI releasing IP address ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.828 [INFO][3406] ipam_plugin.go 415: Releasing address using handleID ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.832 [INFO][3406] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.832 [INFO][3406] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.844 [WARNING][3406] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.844 [INFO][3406] ipam_plugin.go 443: Releasing address using workloadID ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.845 [INFO][3406] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:06.848769 env[1176]: 2024-02-09 19:52:06.846 [INFO][3399] k8s.go 591: Teardown processing complete. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:06.850481 systemd[1]: run-netns-cni\x2d19ed8958\x2d7aac\x2de153\x2d533f\x2dd7bf2d2fda29.mount: Deactivated successfully. Feb 9 19:52:06.852056 env[1176]: time="2024-02-09T19:52:06.852029157Z" level=info msg="TearDown network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" successfully" Feb 9 19:52:06.852139 env[1176]: time="2024-02-09T19:52:06.852123812Z" level=info msg="StopPodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" returns successfully" Feb 9 19:52:06.852690 env[1176]: time="2024-02-09T19:52:06.852672895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-dz8pl,Uid:e85eedc0-1b5c-4171-ad51-e0dd673d46dc,Namespace:kube-system,Attempt:1,}" Feb 9 19:52:06.934917 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:52:06.934998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid62c4621531: link becomes ready Feb 9 19:52:06.935265 systemd-networkd[1065]: calid62c4621531: Link UP Feb 9 19:52:06.935358 systemd-networkd[1065]: calid62c4621531: Gained carrier Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.883 [INFO][3413] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--dz8pl-eth0 coredns-5dd5756b68- kube-system e85eedc0-1b5c-4171-ad51-e0dd673d46dc 699 0 2024-02-09 19:51:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-dz8pl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid62c4621531 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.884 [INFO][3413] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.908 [INFO][3424] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" HandleID="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.913 [INFO][3424] ipam_plugin.go 268: Auto assigning IP ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" HandleID="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027daa0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-dz8pl", "timestamp":"2024-02-09 19:52:06.908305293 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.913 [INFO][3424] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.913 [INFO][3424] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.913 [INFO][3424] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.916 [INFO][3424] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.920 [INFO][3424] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.922 [INFO][3424] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.923 [INFO][3424] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.924 [INFO][3424] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.924 [INFO][3424] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.925 [INFO][3424] ipam.go 1682: Creating new handle: k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3 Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.927 [INFO][3424] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.930 [INFO][3424] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.930 [INFO][3424] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" host="localhost" Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.930 [INFO][3424] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:06.945269 env[1176]: 2024-02-09 19:52:06.930 [INFO][3424] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" HandleID="k8s-pod-network.eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.946474 env[1176]: 2024-02-09 19:52:06.931 [INFO][3413] k8s.go 385: Populated endpoint ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--dz8pl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e85eedc0-1b5c-4171-ad51-e0dd673d46dc", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-dz8pl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62c4621531", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:06.946474 env[1176]: 2024-02-09 19:52:06.932 [INFO][3413] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.946474 env[1176]: 2024-02-09 19:52:06.932 [INFO][3413] dataplane_linux.go 68: Setting the host side veth name to calid62c4621531 ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.946474 env[1176]: 2024-02-09 19:52:06.935 [INFO][3413] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.946474 env[1176]: 2024-02-09 19:52:06.936 [INFO][3413] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--dz8pl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e85eedc0-1b5c-4171-ad51-e0dd673d46dc", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3", Pod:"coredns-5dd5756b68-dz8pl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62c4621531", MAC:"c6:93:5d:0b:a5:d1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:06.946474 env[1176]: 2024-02-09 19:52:06.943 [INFO][3413] k8s.go 491: Wrote updated endpoint to datastore ContainerID="eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3" Namespace="kube-system" Pod="coredns-5dd5756b68-dz8pl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:06.961889 env[1176]: time="2024-02-09T19:52:06.961805007Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:52:06.961889 env[1176]: time="2024-02-09T19:52:06.961867582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:52:06.961994 env[1176]: time="2024-02-09T19:52:06.961893160Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:52:06.962017 env[1176]: time="2024-02-09T19:52:06.961996653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3 pid=3454 runtime=io.containerd.runc.v2 Feb 9 19:52:06.975150 systemd[1]: Started cri-containerd-eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3.scope. Feb 9 19:52:06.979000 audit[3471]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3471 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:06.982742 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 19:52:06.983015 kernel: audit: type=1325 audit(1707508326.979:1170): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3471 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:06.983040 kernel: audit: type=1300 audit(1707508326.979:1170): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd302ec750 a2=0 a3=7ffd302ec73c items=0 ppid=3175 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.979000 audit[3471]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd302ec750 a2=0 a3=7ffd302ec73c items=0 ppid=3175 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.979000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:06.989905 kernel: audit: type=1327 audit(1707508326.979:1170): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995908 kernel: audit: type=1400 audit(1707508326.992:1171): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.001066 kernel: audit: type=1400 audit(1707508326.992:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.001222 kernel: audit: type=1400 audit(1707508326.992:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.001264 kernel: audit: type=1400 audit(1707508326.992:1174): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.001096 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:52:07.003662 kernel: audit: type=1400 audit(1707508326.992:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.006074 kernel: audit: type=1400 audit(1707508326.992:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.012892 kernel: audit: type=1400 audit(1707508326.992:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.992000 audit: BPF prog-id=152 op=LOAD Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656531343031343339643831643164366361326463323966333131 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656531343031343339643831643164366361326463323966333131 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit: BPF prog-id=153 op=LOAD Feb 9 19:52:06.995000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003029a0 items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656531343031343339643831643164366361326463323966333131 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit: BPF prog-id=154 op=LOAD Feb 9 19:52:06.995000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003029e8 items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656531343031343339643831643164366361326463323966333131 Feb 9 19:52:06.995000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:52:06.995000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:06.995000 audit: BPF prog-id=155 op=LOAD Feb 9 19:52:06.995000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000302df8 items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:06.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656531343031343339643831643164366361326463323966333131 Feb 9 19:52:07.030439 env[1176]: time="2024-02-09T19:52:07.030413434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-dz8pl,Uid:e85eedc0-1b5c-4171-ad51-e0dd673d46dc,Namespace:kube-system,Attempt:1,} returns sandbox id \"eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3\"" Feb 9 19:52:07.033001 env[1176]: time="2024-02-09T19:52:07.032137774Z" level=info msg="CreateContainer within sandbox \"eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:52:07.038448 env[1176]: time="2024-02-09T19:52:07.038406472Z" level=info msg="CreateContainer within sandbox \"eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"09de39b97f3d083388e44074f295993fd344a06be46f3c1062b2530af7df2bdb\"" Feb 9 19:52:07.038785 env[1176]: time="2024-02-09T19:52:07.038772526Z" level=info msg="StartContainer for \"09de39b97f3d083388e44074f295993fd344a06be46f3c1062b2530af7df2bdb\"" Feb 9 19:52:07.047929 systemd[1]: Started cri-containerd-09de39b97f3d083388e44074f295993fd344a06be46f3c1062b2530af7df2bdb.scope. Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit: BPF prog-id=156 op=LOAD Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3454 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039646533396239376633643038333338386534343037346632393539 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3454 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039646533396239376633643038333338386534343037346632393539 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.060000 audit: BPF prog-id=157 op=LOAD Feb 9 19:52:07.060000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ae0a0 items=0 ppid=3454 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039646533396239376633643038333338386534343037346632393539 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit: BPF prog-id=158 op=LOAD Feb 9 19:52:07.061000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ae0e8 items=0 ppid=3454 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039646533396239376633643038333338386534343037346632393539 Feb 9 19:52:07.061000 audit: BPF prog-id=158 op=UNLOAD Feb 9 19:52:07.061000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:07.061000 audit: BPF prog-id=159 op=LOAD Feb 9 19:52:07.061000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ae4f8 items=0 ppid=3454 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039646533396239376633643038333338386534343037346632393539 Feb 9 19:52:07.072630 env[1176]: time="2024-02-09T19:52:07.072605211Z" level=info msg="StartContainer for \"09de39b97f3d083388e44074f295993fd344a06be46f3c1062b2530af7df2bdb\" returns successfully" Feb 9 19:52:07.759745 kubelet[2128]: I0209 19:52:07.758693 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-dz8pl" podStartSLOduration=32.758648489 podCreationTimestamp="2024-02-09 19:51:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:52:07.758021744 +0000 UTC m=+48.251275828" watchObservedRunningTime="2024-02-09 19:52:07.758648489 +0000 UTC m=+48.251902573" Feb 9 19:52:07.786000 audit[3535]: NETFILTER_CFG table=filter:102 family=2 entries=11 op=nft_register_rule pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:07.786000 audit[3535]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff15b1f8e0 a2=0 a3=7fff15b1f8cc items=0 ppid=2261 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:07.787000 audit[3535]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:07.787000 audit[3535]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff15b1f8e0 a2=0 a3=7fff15b1f8cc items=0 ppid=2261 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:07.804000 audit[3538]: NETFILTER_CFG table=filter:104 family=2 entries=8 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:07.804000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffed8792e70 a2=0 a3=7ffed8792e5c items=0 ppid=2261 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:07.805000 audit[3538]: NETFILTER_CFG table=nat:105 family=2 entries=20 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:07.805000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffed8792e70 a2=0 a3=7ffed8792e5c items=0 ppid=2261 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:07.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:07.851084 systemd[1]: run-containerd-runc-k8s.io-eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3-runc.rOnTnz.mount: Deactivated successfully. Feb 9 19:52:08.944041 systemd-networkd[1065]: calid62c4621531: Gained IPv6LL Feb 9 19:52:09.582034 env[1176]: time="2024-02-09T19:52:09.582007597Z" level=info msg="StopPodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\"" Feb 9 19:52:09.583121 env[1176]: time="2024-02-09T19:52:09.583103444Z" level=info msg="StopPodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\"" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.617 [INFO][3569] k8s.go 578: Cleaning up netns ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.617 [INFO][3569] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" iface="eth0" netns="/var/run/netns/cni-bdf0b1b9-83bc-e6c7-2f2a-c309dc953de6" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.617 [INFO][3569] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" iface="eth0" netns="/var/run/netns/cni-bdf0b1b9-83bc-e6c7-2f2a-c309dc953de6" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.617 [INFO][3569] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" iface="eth0" netns="/var/run/netns/cni-bdf0b1b9-83bc-e6c7-2f2a-c309dc953de6" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.617 [INFO][3569] k8s.go 585: Releasing IP address(es) ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.617 [INFO][3569] utils.go 188: Calico CNI releasing IP address ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.639 [INFO][3580] ipam_plugin.go 415: Releasing address using handleID ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.639 [INFO][3580] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.639 [INFO][3580] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.643 [WARNING][3580] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.643 [INFO][3580] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.644 [INFO][3580] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:09.646389 env[1176]: 2024-02-09 19:52:09.645 [INFO][3569] k8s.go 591: Teardown processing complete. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:09.646882 env[1176]: time="2024-02-09T19:52:09.646855083Z" level=info msg="TearDown network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" successfully" Feb 9 19:52:09.646941 env[1176]: time="2024-02-09T19:52:09.646929479Z" level=info msg="StopPodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" returns successfully" Feb 9 19:52:09.647982 systemd[1]: run-netns-cni\x2dbdf0b1b9\x2d83bc\x2de6c7\x2d2f2a\x2dc309dc953de6.mount: Deactivated successfully. Feb 9 19:52:09.649822 env[1176]: time="2024-02-09T19:52:09.649809445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-d549n,Uid:59088987-6760-402f-834f-69e3c4081260,Namespace:kube-system,Attempt:1,}" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.626 [INFO][3564] k8s.go 578: Cleaning up netns ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.626 [INFO][3564] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" iface="eth0" netns="/var/run/netns/cni-31c68165-1d63-72c4-195d-971aa96164a0" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.626 [INFO][3564] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" iface="eth0" netns="/var/run/netns/cni-31c68165-1d63-72c4-195d-971aa96164a0" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.626 [INFO][3564] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" iface="eth0" netns="/var/run/netns/cni-31c68165-1d63-72c4-195d-971aa96164a0" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.626 [INFO][3564] k8s.go 585: Releasing IP address(es) ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.626 [INFO][3564] utils.go 188: Calico CNI releasing IP address ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.651 [INFO][3585] ipam_plugin.go 415: Releasing address using handleID ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.652 [INFO][3585] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.653 [INFO][3585] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.658 [WARNING][3585] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.658 [INFO][3585] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.659 [INFO][3585] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:09.664146 env[1176]: 2024-02-09 19:52:09.663 [INFO][3564] k8s.go 591: Teardown processing complete. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:09.665475 systemd[1]: run-netns-cni\x2d31c68165\x2d1d63\x2d72c4\x2d195d\x2d971aa96164a0.mount: Deactivated successfully. Feb 9 19:52:09.666243 env[1176]: time="2024-02-09T19:52:09.666219668Z" level=info msg="TearDown network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" successfully" Feb 9 19:52:09.666464 env[1176]: time="2024-02-09T19:52:09.666452413Z" level=info msg="StopPodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" returns successfully" Feb 9 19:52:09.667285 env[1176]: time="2024-02-09T19:52:09.667272372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-844cbb97c5-7k5nj,Uid:b5fbc0e3-62ee-4617-a6f6-319ede7bee78,Namespace:calico-system,Attempt:1,}" Feb 9 19:52:09.764465 systemd-networkd[1065]: cali4781f507c20: Link UP Feb 9 19:52:09.766621 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:52:09.766662 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4781f507c20: link becomes ready Feb 9 19:52:09.766740 systemd-networkd[1065]: cali4781f507c20: Gained carrier Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.691 [INFO][3599] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--d549n-eth0 coredns-5dd5756b68- kube-system 59088987-6760-402f-834f-69e3c4081260 723 0 2024-02-09 19:51:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-d549n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4781f507c20 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.691 [INFO][3599] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.726 [INFO][3617] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" HandleID="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.736 [INFO][3617] ipam_plugin.go 268: Auto assigning IP ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" HandleID="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000316c80), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-d549n", "timestamp":"2024-02-09 19:52:09.726342005 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.736 [INFO][3617] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.736 [INFO][3617] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.736 [INFO][3617] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.744 [INFO][3617] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.746 [INFO][3617] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.750 [INFO][3617] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.751 [INFO][3617] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.752 [INFO][3617] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.752 [INFO][3617] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.753 [INFO][3617] ipam.go 1682: Creating new handle: k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.756 [INFO][3617] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.760 [INFO][3617] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.760 [INFO][3617] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" host="localhost" Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.760 [INFO][3617] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:09.780689 env[1176]: 2024-02-09 19:52:09.760 [INFO][3617] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" HandleID="k8s-pod-network.293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.781269 env[1176]: 2024-02-09 19:52:09.762 [INFO][3599] k8s.go 385: Populated endpoint ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--d549n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"59088987-6760-402f-834f-69e3c4081260", ResourceVersion:"723", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-d549n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4781f507c20", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:09.781269 env[1176]: 2024-02-09 19:52:09.762 [INFO][3599] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.781269 env[1176]: 2024-02-09 19:52:09.762 [INFO][3599] dataplane_linux.go 68: Setting the host side veth name to cali4781f507c20 ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.781269 env[1176]: 2024-02-09 19:52:09.767 [INFO][3599] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.781269 env[1176]: 2024-02-09 19:52:09.767 [INFO][3599] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--d549n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"59088987-6760-402f-834f-69e3c4081260", ResourceVersion:"723", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb", Pod:"coredns-5dd5756b68-d549n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4781f507c20", MAC:"06:2d:03:04:8c:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:09.781269 env[1176]: 2024-02-09 19:52:09.779 [INFO][3599] k8s.go 491: Wrote updated endpoint to datastore ContainerID="293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb" Namespace="kube-system" Pod="coredns-5dd5756b68-d549n" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:09.791462 env[1176]: time="2024-02-09T19:52:09.791418701Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:52:09.791462 env[1176]: time="2024-02-09T19:52:09.791460421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:52:09.791578 env[1176]: time="2024-02-09T19:52:09.791475515Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:52:09.791603 env[1176]: time="2024-02-09T19:52:09.791568603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb pid=3650 runtime=io.containerd.runc.v2 Feb 9 19:52:09.805702 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califc179191788: link becomes ready Feb 9 19:52:09.806167 systemd-networkd[1065]: califc179191788: Link UP Feb 9 19:52:09.806260 systemd-networkd[1065]: califc179191788: Gained carrier Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.714 [INFO][3605] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0 calico-kube-controllers-844cbb97c5- calico-system b5fbc0e3-62ee-4617-a6f6-319ede7bee78 724 0 2024-02-09 19:51:39 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:844cbb97c5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-844cbb97c5-7k5nj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califc179191788 [] []}} ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.714 [INFO][3605] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.748 [INFO][3625] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" HandleID="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.756 [INFO][3625] ipam_plugin.go 268: Auto assigning IP ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" HandleID="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ca90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-844cbb97c5-7k5nj", "timestamp":"2024-02-09 19:52:09.748423816 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.756 [INFO][3625] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.760 [INFO][3625] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.760 [INFO][3625] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.762 [INFO][3625] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.773 [INFO][3625] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.778 [INFO][3625] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.780 [INFO][3625] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.783 [INFO][3625] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.783 [INFO][3625] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.785 [INFO][3625] ipam.go 1682: Creating new handle: k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.789 [INFO][3625] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.797 [INFO][3625] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.798 [INFO][3625] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" host="localhost" Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.798 [INFO][3625] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:09.820730 env[1176]: 2024-02-09 19:52:09.798 [INFO][3625] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" HandleID="k8s-pod-network.2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.822441 env[1176]: 2024-02-09 19:52:09.802 [INFO][3605] k8s.go 385: Populated endpoint ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0", GenerateName:"calico-kube-controllers-844cbb97c5-", Namespace:"calico-system", SelfLink:"", UID:"b5fbc0e3-62ee-4617-a6f6-319ede7bee78", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"844cbb97c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-844cbb97c5-7k5nj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc179191788", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:09.822441 env[1176]: 2024-02-09 19:52:09.802 [INFO][3605] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.822441 env[1176]: 2024-02-09 19:52:09.802 [INFO][3605] dataplane_linux.go 68: Setting the host side veth name to califc179191788 ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.822441 env[1176]: 2024-02-09 19:52:09.808 [INFO][3605] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.822441 env[1176]: 2024-02-09 19:52:09.808 [INFO][3605] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0", GenerateName:"calico-kube-controllers-844cbb97c5-", Namespace:"calico-system", SelfLink:"", UID:"b5fbc0e3-62ee-4617-a6f6-319ede7bee78", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"844cbb97c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b", Pod:"calico-kube-controllers-844cbb97c5-7k5nj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc179191788", MAC:"66:f8:f3:59:e9:13", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:09.822441 env[1176]: 2024-02-09 19:52:09.819 [INFO][3605] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b" Namespace="calico-system" Pod="calico-kube-controllers-844cbb97c5-7k5nj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:09.828259 systemd[1]: Started cri-containerd-293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb.scope. Feb 9 19:52:09.833000 audit[3670]: NETFILTER_CFG table=filter:106 family=2 entries=30 op=nft_register_chain pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:09.833000 audit[3670]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffce4ee7ed0 a2=0 a3=7ffce4ee7ebc items=0 ppid=3175 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.833000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:09.839125 env[1176]: time="2024-02-09T19:52:09.839022064Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:52:09.839125 env[1176]: time="2024-02-09T19:52:09.839050995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:52:09.839125 env[1176]: time="2024-02-09T19:52:09.839057815Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:52:09.839354 env[1176]: time="2024-02-09T19:52:09.839327859Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b pid=3690 runtime=io.containerd.runc.v2 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit: BPF prog-id=160 op=LOAD Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3650 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336139653962666134313163626335396330323234613566306637 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3650 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336139653962666134313163626335396330323234613566306637 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit: BPF prog-id=161 op=LOAD Feb 9 19:52:09.849000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000228da0 items=0 ppid=3650 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336139653962666134313163626335396330323234613566306637 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit: BPF prog-id=162 op=LOAD Feb 9 19:52:09.849000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000228de8 items=0 ppid=3650 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336139653962666134313163626335396330323234613566306637 Feb 9 19:52:09.849000 audit: BPF prog-id=162 op=UNLOAD Feb 9 19:52:09.849000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.849000 audit: BPF prog-id=163 op=LOAD Feb 9 19:52:09.849000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002291f8 items=0 ppid=3650 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336139653962666134313163626335396330323234613566306637 Feb 9 19:52:09.859364 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:52:09.867625 systemd[1]: Started cri-containerd-2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b.scope. Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.899000 audit: BPF prog-id=164 op=LOAD Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3690 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633232363262623837393436666538313538383761316465323237 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3690 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633232363262623837393436666538313538383761316465323237 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit: BPF prog-id=165 op=LOAD Feb 9 19:52:09.900000 audit[3706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d66d0 items=0 ppid=3690 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633232363262623837393436666538313538383761316465323237 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit: BPF prog-id=166 op=LOAD Feb 9 19:52:09.900000 audit[3706]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d6718 items=0 ppid=3690 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633232363262623837393436666538313538383761316465323237 Feb 9 19:52:09.900000 audit: BPF prog-id=166 op=UNLOAD Feb 9 19:52:09.900000 audit: BPF prog-id=165 op=UNLOAD Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { perfmon } for pid=3706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit[3706]: AVC avc: denied { bpf } for pid=3706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:09.900000 audit: BPF prog-id=167 op=LOAD Feb 9 19:52:09.900000 audit[3706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d6b28 items=0 ppid=3690 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266633232363262623837393436666538313538383761316465323237 Feb 9 19:52:09.902257 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:52:09.908154 env[1176]: time="2024-02-09T19:52:09.903822008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-d549n,Uid:59088987-6760-402f-834f-69e3c4081260,Namespace:kube-system,Attempt:1,} returns sandbox id \"293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb\"" Feb 9 19:52:09.912919 env[1176]: time="2024-02-09T19:52:09.912898243Z" level=info msg="CreateContainer within sandbox \"293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:52:09.916000 audit[3736]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=3736 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:09.916000 audit[3736]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffe3f4083a0 a2=0 a3=7ffe3f40838c items=0 ppid=3175 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:09.916000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:09.943507 env[1176]: time="2024-02-09T19:52:09.943471573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-844cbb97c5-7k5nj,Uid:b5fbc0e3-62ee-4617-a6f6-319ede7bee78,Namespace:calico-system,Attempt:1,} returns sandbox id \"2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b\"" Feb 9 19:52:09.947383 env[1176]: time="2024-02-09T19:52:09.947359234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:52:09.970632 env[1176]: time="2024-02-09T19:52:09.970602818Z" level=info msg="CreateContainer within sandbox \"293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"77062ee1429005b0748ce70a34e3e4825f13d55da9ea35290fc16dae98a69763\"" Feb 9 19:52:09.971469 env[1176]: time="2024-02-09T19:52:09.971454543Z" level=info msg="StartContainer for \"77062ee1429005b0748ce70a34e3e4825f13d55da9ea35290fc16dae98a69763\"" Feb 9 19:52:09.987749 systemd[1]: Started cri-containerd-77062ee1429005b0748ce70a34e3e4825f13d55da9ea35290fc16dae98a69763.scope. Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit: BPF prog-id=168 op=LOAD Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3650 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737303632656531343239303035623037343863653730613334653365 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3650 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737303632656531343239303035623037343863653730613334653365 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit: BPF prog-id=169 op=LOAD Feb 9 19:52:10.002000 audit[3750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e6fc0 items=0 ppid=3650 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737303632656531343239303035623037343863653730613334653365 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit: BPF prog-id=170 op=LOAD Feb 9 19:52:10.002000 audit[3750]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e7008 items=0 ppid=3650 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737303632656531343239303035623037343863653730613334653365 Feb 9 19:52:10.002000 audit: BPF prog-id=170 op=UNLOAD Feb 9 19:52:10.002000 audit: BPF prog-id=169 op=UNLOAD Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.002000 audit: BPF prog-id=171 op=LOAD Feb 9 19:52:10.002000 audit[3750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e7418 items=0 ppid=3650 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737303632656531343239303035623037343863653730613334653365 Feb 9 19:52:10.025589 env[1176]: time="2024-02-09T19:52:10.025561330Z" level=info msg="StartContainer for \"77062ee1429005b0748ce70a34e3e4825f13d55da9ea35290fc16dae98a69763\" returns successfully" Feb 9 19:52:10.581734 env[1176]: time="2024-02-09T19:52:10.581697886Z" level=info msg="StopPodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\"" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.609 [INFO][3793] k8s.go 578: Cleaning up netns ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.609 [INFO][3793] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" iface="eth0" netns="/var/run/netns/cni-3de6fa4d-28c0-a168-5788-5af949dbc815" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.609 [INFO][3793] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" iface="eth0" netns="/var/run/netns/cni-3de6fa4d-28c0-a168-5788-5af949dbc815" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.609 [INFO][3793] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" iface="eth0" netns="/var/run/netns/cni-3de6fa4d-28c0-a168-5788-5af949dbc815" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.609 [INFO][3793] k8s.go 585: Releasing IP address(es) ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.609 [INFO][3793] utils.go 188: Calico CNI releasing IP address ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.622 [INFO][3800] ipam_plugin.go 415: Releasing address using handleID ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.622 [INFO][3800] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.622 [INFO][3800] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.627 [WARNING][3800] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.627 [INFO][3800] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.629 [INFO][3800] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:10.632213 env[1176]: 2024-02-09 19:52:10.630 [INFO][3793] k8s.go 591: Teardown processing complete. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:10.632828 env[1176]: time="2024-02-09T19:52:10.632801181Z" level=info msg="TearDown network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" successfully" Feb 9 19:52:10.632895 env[1176]: time="2024-02-09T19:52:10.632874016Z" level=info msg="StopPodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" returns successfully" Feb 9 19:52:10.633359 env[1176]: time="2024-02-09T19:52:10.633346666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4kpxb,Uid:54d1291f-fe29-442a-b31e-c69d6ea59d02,Namespace:calico-system,Attempt:1,}" Feb 9 19:52:10.650075 systemd[1]: run-netns-cni\x2d3de6fa4d\x2d28c0\x2da168\x2d5788\x2d5af949dbc815.mount: Deactivated successfully. Feb 9 19:52:10.758628 systemd-networkd[1065]: calie05e656b119: Link UP Feb 9 19:52:10.760907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie05e656b119: link becomes ready Feb 9 19:52:10.761033 systemd-networkd[1065]: calie05e656b119: Gained carrier Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.666 [INFO][3806] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--4kpxb-eth0 csi-node-driver- calico-system 54d1291f-fe29-442a-b31e-c69d6ea59d02 737 0 2024-02-09 19:51:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-4kpxb eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie05e656b119 [] []}} ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.666 [INFO][3806] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.703 [INFO][3817] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" HandleID="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.717 [INFO][3817] ipam_plugin.go 268: Auto assigning IP ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" HandleID="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290af0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-4kpxb", "timestamp":"2024-02-09 19:52:10.703531551 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.717 [INFO][3817] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.718 [INFO][3817] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.718 [INFO][3817] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.719 [INFO][3817] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.725 [INFO][3817] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.728 [INFO][3817] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.730 [INFO][3817] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.733 [INFO][3817] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.733 [INFO][3817] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.734 [INFO][3817] ipam.go 1682: Creating new handle: k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0 Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.739 [INFO][3817] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.749 [INFO][3817] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.749 [INFO][3817] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" host="localhost" Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.749 [INFO][3817] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:10.768952 env[1176]: 2024-02-09 19:52:10.750 [INFO][3817] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" HandleID="k8s-pod-network.d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.769567 env[1176]: 2024-02-09 19:52:10.751 [INFO][3806] k8s.go 385: Populated endpoint ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4kpxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"54d1291f-fe29-442a-b31e-c69d6ea59d02", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-4kpxb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie05e656b119", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:10.769567 env[1176]: 2024-02-09 19:52:10.751 [INFO][3806] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.769567 env[1176]: 2024-02-09 19:52:10.751 [INFO][3806] dataplane_linux.go 68: Setting the host side veth name to calie05e656b119 ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.769567 env[1176]: 2024-02-09 19:52:10.758 [INFO][3806] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.769567 env[1176]: 2024-02-09 19:52:10.758 [INFO][3806] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4kpxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"54d1291f-fe29-442a-b31e-c69d6ea59d02", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0", Pod:"csi-node-driver-4kpxb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie05e656b119", MAC:"0e:ce:46:12:79:e6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:10.769567 env[1176]: 2024-02-09 19:52:10.767 [INFO][3806] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0" Namespace="calico-system" Pod="csi-node-driver-4kpxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:10.784543 env[1176]: time="2024-02-09T19:52:10.784496875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:52:10.784632 env[1176]: time="2024-02-09T19:52:10.784548293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:52:10.784632 env[1176]: time="2024-02-09T19:52:10.784565363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:52:10.784688 env[1176]: time="2024-02-09T19:52:10.784648066Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0 pid=3842 runtime=io.containerd.runc.v2 Feb 9 19:52:10.786257 kubelet[2128]: I0209 19:52:10.786153 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-d549n" podStartSLOduration=35.786128742 podCreationTimestamp="2024-02-09 19:51:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:52:10.777135654 +0000 UTC m=+51.270389738" watchObservedRunningTime="2024-02-09 19:52:10.786128742 +0000 UTC m=+51.279382819" Feb 9 19:52:10.801433 systemd[1]: Started cri-containerd-d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0.scope. Feb 9 19:52:10.810000 audit[3871]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:10.810000 audit[3871]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcefa8f8d0 a2=0 a3=7ffcefa8f8bc items=0 ppid=2261 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:10.811000 audit[3871]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=3871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:10.811000 audit[3871]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcefa8f8d0 a2=0 a3=7ffcefa8f8bc items=0 ppid=2261 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.815000 audit: BPF prog-id=172 op=LOAD Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3842 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437626561346330396238323533323531653561343533643735393666 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3842 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437626561346330396238323533323531653561343533643735393666 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit: BPF prog-id=173 op=LOAD Feb 9 19:52:10.816000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000098ef0 items=0 ppid=3842 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437626561346330396238323533323531653561343533643735393666 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit: BPF prog-id=174 op=LOAD Feb 9 19:52:10.816000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000098f38 items=0 ppid=3842 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437626561346330396238323533323531653561343533643735393666 Feb 9 19:52:10.816000 audit: BPF prog-id=174 op=UNLOAD Feb 9 19:52:10.816000 audit: BPF prog-id=173 op=UNLOAD Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:10.816000 audit: BPF prog-id=175 op=LOAD Feb 9 19:52:10.816000 audit[3853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000099348 items=0 ppid=3842 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437626561346330396238323533323531653561343533643735393666 Feb 9 19:52:10.818846 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:52:10.838235 env[1176]: time="2024-02-09T19:52:10.838207905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4kpxb,Uid:54d1291f-fe29-442a-b31e-c69d6ea59d02,Namespace:calico-system,Attempt:1,} returns sandbox id \"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0\"" Feb 9 19:52:10.841000 audit[3880]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:10.841000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffe908b1f90 a2=0 a3=7ffe908b1f7c items=0 ppid=3175 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.841000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:10.842000 audit[3881]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:10.842000 audit[3881]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffedc545f70 a2=0 a3=7ffedc545f5c items=0 ppid=2261 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:10.854000 audit[3881]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:10.854000 audit[3881]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffedc545f70 a2=0 a3=7ffedc545f5c items=0 ppid=2261 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:10.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:11.120049 systemd-networkd[1065]: califc179191788: Gained IPv6LL Feb 9 19:52:11.648120 systemd[1]: run-containerd-runc-k8s.io-23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1-runc.dROIqC.mount: Deactivated successfully. Feb 9 19:52:11.760061 systemd-networkd[1065]: cali4781f507c20: Gained IPv6LL Feb 9 19:52:12.016374 systemd-networkd[1065]: calie05e656b119: Gained IPv6LL Feb 9 19:52:12.677866 env[1176]: time="2024-02-09T19:52:12.677835452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:12.680132 env[1176]: time="2024-02-09T19:52:12.680117175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:12.683418 env[1176]: time="2024-02-09T19:52:12.683397609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:12.686317 env[1176]: time="2024-02-09T19:52:12.684555962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:12.686317 env[1176]: time="2024-02-09T19:52:12.684747800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:52:12.687127 env[1176]: time="2024-02-09T19:52:12.687112091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:52:12.700333 env[1176]: time="2024-02-09T19:52:12.700277732Z" level=info msg="CreateContainer within sandbox \"2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:52:12.715201 env[1176]: time="2024-02-09T19:52:12.715167592Z" level=info msg="CreateContainer within sandbox \"2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1\"" Feb 9 19:52:12.715697 env[1176]: time="2024-02-09T19:52:12.715683158Z" level=info msg="StartContainer for \"7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1\"" Feb 9 19:52:12.734381 systemd[1]: Started cri-containerd-7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1.scope. Feb 9 19:52:12.751670 kernel: kauditd_printk_skb: 368 callbacks suppressed Feb 9 19:52:12.751754 kernel: audit: type=1400 audit(1707508332.742:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751776 kernel: audit: type=1400 audit(1707508332.742:1291): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751798 kernel: audit: type=1400 audit(1707508332.742:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.757227 kernel: audit: type=1400 audit(1707508332.742:1293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.757264 kernel: audit: type=1400 audit(1707508332.742:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.759907 kernel: audit: type=1400 audit(1707508332.742:1295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.763086 kernel: audit: type=1400 audit(1707508332.742:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.765618 kernel: audit: type=1400 audit(1707508332.742:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.768209 kernel: audit: type=1400 audit(1707508332.742:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit: BPF prog-id=176 op=LOAD Feb 9 19:52:12.771924 kernel: audit: type=1400 audit(1707508332.742:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3690 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:12.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383964356339396462633833303231303565653539393539636531 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3690 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:12.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383964356339396462633833303231303565653539393539636531 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.742000 audit: BPF prog-id=177 op=LOAD Feb 9 19:52:12.742000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00028aa70 items=0 ppid=3690 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:12.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383964356339396462633833303231303565653539393539636531 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.744000 audit: BPF prog-id=178 op=LOAD Feb 9 19:52:12.744000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00028aab8 items=0 ppid=3690 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:12.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383964356339396462633833303231303565653539393539636531 Feb 9 19:52:12.751000 audit: BPF prog-id=178 op=UNLOAD Feb 9 19:52:12.751000 audit: BPF prog-id=177 op=UNLOAD Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:12.751000 audit: BPF prog-id=179 op=LOAD Feb 9 19:52:12.751000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00028aec8 items=0 ppid=3690 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:12.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383964356339396462633833303231303565653539393539636531 Feb 9 19:52:12.782210 env[1176]: time="2024-02-09T19:52:12.782168147Z" level=info msg="StartContainer for \"7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1\" returns successfully" Feb 9 19:52:13.787919 systemd[1]: run-containerd-runc-k8s.io-7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1-runc.Yu0liW.mount: Deactivated successfully. Feb 9 19:52:13.825769 kubelet[2128]: I0209 19:52:13.825661 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-844cbb97c5-7k5nj" podStartSLOduration=32.083625169 podCreationTimestamp="2024-02-09 19:51:39 +0000 UTC" firstStartedPulling="2024-02-09 19:52:09.944398784 +0000 UTC m=+50.437652855" lastFinishedPulling="2024-02-09 19:52:12.686407534 +0000 UTC m=+53.179661609" observedRunningTime="2024-02-09 19:52:13.793138976 +0000 UTC m=+54.286393062" watchObservedRunningTime="2024-02-09 19:52:13.825633923 +0000 UTC m=+54.318888006" Feb 9 19:52:14.508597 env[1176]: time="2024-02-09T19:52:14.508554094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:14.509593 env[1176]: time="2024-02-09T19:52:14.509573130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:14.510759 env[1176]: time="2024-02-09T19:52:14.510741010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:14.511941 env[1176]: time="2024-02-09T19:52:14.511924023Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:14.512513 env[1176]: time="2024-02-09T19:52:14.512491348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:52:14.515553 env[1176]: time="2024-02-09T19:52:14.515522359Z" level=info msg="CreateContainer within sandbox \"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:52:14.527523 env[1176]: time="2024-02-09T19:52:14.527487932Z" level=info msg="CreateContainer within sandbox \"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9434ef40f6698d164db790ab6313ce7239de68043dc409e586b0d1c396def939\"" Feb 9 19:52:14.528957 env[1176]: time="2024-02-09T19:52:14.528616486Z" level=info msg="StartContainer for \"9434ef40f6698d164db790ab6313ce7239de68043dc409e586b0d1c396def939\"" Feb 9 19:52:14.540142 systemd[1]: Started cri-containerd-9434ef40f6698d164db790ab6313ce7239de68043dc409e586b0d1c396def939.scope. Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3842 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:14.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333465663430663636393864313634646237393061623633313363 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit: BPF prog-id=180 op=LOAD Feb 9 19:52:14.553000 audit[3976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00039e1d0 items=0 ppid=3842 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:14.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333465663430663636393864313634646237393061623633313363 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit: BPF prog-id=181 op=LOAD Feb 9 19:52:14.553000 audit[3976]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00039e218 items=0 ppid=3842 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:14.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333465663430663636393864313634646237393061623633313363 Feb 9 19:52:14.553000 audit: BPF prog-id=181 op=UNLOAD Feb 9 19:52:14.553000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:14.553000 audit: BPF prog-id=182 op=LOAD Feb 9 19:52:14.553000 audit[3976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00039e2a8 items=0 ppid=3842 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:14.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934333465663430663636393864313634646237393061623633313363 Feb 9 19:52:14.568031 env[1176]: time="2024-02-09T19:52:14.567986914Z" level=info msg="StartContainer for \"9434ef40f6698d164db790ab6313ce7239de68043dc409e586b0d1c396def939\" returns successfully" Feb 9 19:52:14.569580 env[1176]: time="2024-02-09T19:52:14.568833847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:52:14.692820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1937366188.mount: Deactivated successfully. Feb 9 19:52:15.032000 audit[4003]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4003 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:15.032000 audit[4003]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc70faefd0 a2=0 a3=7ffc70faefbc items=0 ppid=2261 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:15.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:15.037000 audit[4003]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4003 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:15.037000 audit[4003]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc70faefd0 a2=0 a3=7ffc70faefbc items=0 ppid=2261 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:15.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:15.050000 audit[4005]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:15.050000 audit[4005]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcee81f4a0 a2=0 a3=7ffcee81f48c items=0 ppid=2261 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:15.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:15.051000 audit[4005]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:15.051000 audit[4005]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcee81f4a0 a2=0 a3=7ffcee81f48c items=0 ppid=2261 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:15.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:15.079937 kubelet[2128]: I0209 19:52:15.079635 2128 topology_manager.go:215] "Topology Admit Handler" podUID="83fa1c1f-c9be-4a61-bbe9-419642824c3d" podNamespace="calico-apiserver" podName="calico-apiserver-64c547b7fb-ngm72" Feb 9 19:52:15.083090 kubelet[2128]: I0209 19:52:15.081550 2128 topology_manager.go:215] "Topology Admit Handler" podUID="daf3268a-9015-49bb-9be9-09d1ebb63414" podNamespace="calico-apiserver" podName="calico-apiserver-64c547b7fb-wpbjd" Feb 9 19:52:15.086220 systemd[1]: Created slice kubepods-besteffort-pod83fa1c1f_c9be_4a61_bbe9_419642824c3d.slice. Feb 9 19:52:15.089613 systemd[1]: Created slice kubepods-besteffort-poddaf3268a_9015_49bb_9be9_09d1ebb63414.slice. Feb 9 19:52:15.201840 kubelet[2128]: I0209 19:52:15.201782 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7r4ln\" (UniqueName: \"kubernetes.io/projected/daf3268a-9015-49bb-9be9-09d1ebb63414-kube-api-access-7r4ln\") pod \"calico-apiserver-64c547b7fb-wpbjd\" (UID: \"daf3268a-9015-49bb-9be9-09d1ebb63414\") " pod="calico-apiserver/calico-apiserver-64c547b7fb-wpbjd" Feb 9 19:52:15.201840 kubelet[2128]: I0209 19:52:15.201814 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/83fa1c1f-c9be-4a61-bbe9-419642824c3d-calico-apiserver-certs\") pod \"calico-apiserver-64c547b7fb-ngm72\" (UID: \"83fa1c1f-c9be-4a61-bbe9-419642824c3d\") " pod="calico-apiserver/calico-apiserver-64c547b7fb-ngm72" Feb 9 19:52:15.201840 kubelet[2128]: I0209 19:52:15.201828 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/daf3268a-9015-49bb-9be9-09d1ebb63414-calico-apiserver-certs\") pod \"calico-apiserver-64c547b7fb-wpbjd\" (UID: \"daf3268a-9015-49bb-9be9-09d1ebb63414\") " pod="calico-apiserver/calico-apiserver-64c547b7fb-wpbjd" Feb 9 19:52:15.202031 kubelet[2128]: I0209 19:52:15.201903 2128 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fn5n6\" (UniqueName: \"kubernetes.io/projected/83fa1c1f-c9be-4a61-bbe9-419642824c3d-kube-api-access-fn5n6\") pod \"calico-apiserver-64c547b7fb-ngm72\" (UID: \"83fa1c1f-c9be-4a61-bbe9-419642824c3d\") " pod="calico-apiserver/calico-apiserver-64c547b7fb-ngm72" Feb 9 19:52:15.308472 kubelet[2128]: E0209 19:52:15.304842 2128 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:52:15.312812 kubelet[2128]: E0209 19:52:15.312791 2128 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/83fa1c1f-c9be-4a61-bbe9-419642824c3d-calico-apiserver-certs podName:83fa1c1f-c9be-4a61-bbe9-419642824c3d nodeName:}" failed. No retries permitted until 2024-02-09 19:52:15.808346211 +0000 UTC m=+56.301600283 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/83fa1c1f-c9be-4a61-bbe9-419642824c3d-calico-apiserver-certs") pod "calico-apiserver-64c547b7fb-ngm72" (UID: "83fa1c1f-c9be-4a61-bbe9-419642824c3d") : secret "calico-apiserver-certs" not found Feb 9 19:52:15.312968 kubelet[2128]: E0209 19:52:15.304841 2128 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:52:15.312999 kubelet[2128]: E0209 19:52:15.312982 2128 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/daf3268a-9015-49bb-9be9-09d1ebb63414-calico-apiserver-certs podName:daf3268a-9015-49bb-9be9-09d1ebb63414 nodeName:}" failed. No retries permitted until 2024-02-09 19:52:15.812972768 +0000 UTC m=+56.306226843 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/daf3268a-9015-49bb-9be9-09d1ebb63414-calico-apiserver-certs") pod "calico-apiserver-64c547b7fb-wpbjd" (UID: "daf3268a-9015-49bb-9be9-09d1ebb63414") : secret "calico-apiserver-certs" not found Feb 9 19:52:15.905547 kubelet[2128]: E0209 19:52:15.905506 2128 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:52:15.905727 kubelet[2128]: E0209 19:52:15.905585 2128 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/daf3268a-9015-49bb-9be9-09d1ebb63414-calico-apiserver-certs podName:daf3268a-9015-49bb-9be9-09d1ebb63414 nodeName:}" failed. No retries permitted until 2024-02-09 19:52:16.905574866 +0000 UTC m=+57.398828945 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/daf3268a-9015-49bb-9be9-09d1ebb63414-calico-apiserver-certs") pod "calico-apiserver-64c547b7fb-wpbjd" (UID: "daf3268a-9015-49bb-9be9-09d1ebb63414") : secret "calico-apiserver-certs" not found Feb 9 19:52:15.905858 kubelet[2128]: E0209 19:52:15.905846 2128 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:52:15.905952 kubelet[2128]: E0209 19:52:15.905941 2128 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/83fa1c1f-c9be-4a61-bbe9-419642824c3d-calico-apiserver-certs podName:83fa1c1f-c9be-4a61-bbe9-419642824c3d nodeName:}" failed. No retries permitted until 2024-02-09 19:52:16.905930332 +0000 UTC m=+57.399184412 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/83fa1c1f-c9be-4a61-bbe9-419642824c3d-calico-apiserver-certs") pod "calico-apiserver-64c547b7fb-ngm72" (UID: "83fa1c1f-c9be-4a61-bbe9-419642824c3d") : secret "calico-apiserver-certs" not found Feb 9 19:52:16.318563 env[1176]: time="2024-02-09T19:52:16.318233610Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:16.333934 env[1176]: time="2024-02-09T19:52:16.333911521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:16.339993 env[1176]: time="2024-02-09T19:52:16.339970502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:16.344282 env[1176]: time="2024-02-09T19:52:16.344264729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:16.344569 env[1176]: time="2024-02-09T19:52:16.344548099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:52:16.346856 env[1176]: time="2024-02-09T19:52:16.346835705Z" level=info msg="CreateContainer within sandbox \"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:52:16.375759 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1057243783.mount: Deactivated successfully. Feb 9 19:52:16.410226 env[1176]: time="2024-02-09T19:52:16.410196996Z" level=info msg="CreateContainer within sandbox \"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0367312f7fbfc206d8ccbbd666a4cafaf8758ebe2407d931cc0fcde8d01fa3c7\"" Feb 9 19:52:16.410739 env[1176]: time="2024-02-09T19:52:16.410725402Z" level=info msg="StartContainer for \"0367312f7fbfc206d8ccbbd666a4cafaf8758ebe2407d931cc0fcde8d01fa3c7\"" Feb 9 19:52:16.433102 systemd[1]: Started cri-containerd-0367312f7fbfc206d8ccbbd666a4cafaf8758ebe2407d931cc0fcde8d01fa3c7.scope. Feb 9 19:52:16.436362 systemd[1]: run-containerd-runc-k8s.io-0367312f7fbfc206d8ccbbd666a4cafaf8758ebe2407d931cc0fcde8d01fa3c7-runc.QvbtNE.mount: Deactivated successfully. Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3842 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:16.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033363733313266376662666332303664386363626264363636613463 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit: BPF prog-id=183 op=LOAD Feb 9 19:52:16.447000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000312f40 items=0 ppid=3842 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:16.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033363733313266376662666332303664386363626264363636613463 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit: BPF prog-id=184 op=LOAD Feb 9 19:52:16.447000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000312f88 items=0 ppid=3842 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:16.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033363733313266376662666332303664386363626264363636613463 Feb 9 19:52:16.447000 audit: BPF prog-id=184 op=UNLOAD Feb 9 19:52:16.447000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:16.447000 audit: BPF prog-id=185 op=LOAD Feb 9 19:52:16.447000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000313018 items=0 ppid=3842 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:16.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033363733313266376662666332303664386363626264363636613463 Feb 9 19:52:16.447000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.447000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002273940 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:16.447000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:16.447000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.447000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029c4660 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:16.447000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:16.458375 env[1176]: time="2024-02-09T19:52:16.458337150Z" level=info msg="StartContainer for \"0367312f7fbfc206d8ccbbd666a4cafaf8758ebe2407d931cc0fcde8d01fa3c7\" returns successfully" Feb 9 19:52:16.597000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.597000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.597000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008b4bd10 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:52:16.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:52:16.597000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00883cd60 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:52:16.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:52:16.598000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.598000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c008814270 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:52:16.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:52:16.618000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.618000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008bfff20 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:52:16.618000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:52:16.682000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.682000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008901140 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:52:16.682000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:52:16.684145 kubelet[2128]: I0209 19:52:16.683909 2128 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:52:16.684000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:16.684000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008847920 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:52:16.684000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:52:16.685573 kubelet[2128]: I0209 19:52:16.685555 2128 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:52:17.189788 env[1176]: time="2024-02-09T19:52:17.189753262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64c547b7fb-ngm72,Uid:83fa1c1f-c9be-4a61-bbe9-419642824c3d,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:52:17.192964 env[1176]: time="2024-02-09T19:52:17.192943475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64c547b7fb-wpbjd,Uid:daf3268a-9015-49bb-9be9-09d1ebb63414,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:52:17.672582 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:52:17.673270 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif6bcc9ac3a7: link becomes ready Feb 9 19:52:17.673050 systemd-networkd[1065]: calif6bcc9ac3a7: Link UP Feb 9 19:52:17.673151 systemd-networkd[1065]: calif6bcc9ac3a7: Gained carrier Feb 9 19:52:17.679756 kubelet[2128]: I0209 19:52:17.679729 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-4kpxb" podStartSLOduration=33.173795705 podCreationTimestamp="2024-02-09 19:51:39 +0000 UTC" firstStartedPulling="2024-02-09 19:52:10.839077115 +0000 UTC m=+51.332331190" lastFinishedPulling="2024-02-09 19:52:16.344981458 +0000 UTC m=+56.838235533" observedRunningTime="2024-02-09 19:52:16.793522103 +0000 UTC m=+57.286776185" watchObservedRunningTime="2024-02-09 19:52:17.679700048 +0000 UTC m=+58.172954125" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.612 [INFO][4051] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0 calico-apiserver-64c547b7fb- calico-apiserver 83fa1c1f-c9be-4a61-bbe9-419642824c3d 818 0 2024-02-09 19:52:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64c547b7fb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-64c547b7fb-ngm72 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif6bcc9ac3a7 [] []}} ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.613 [INFO][4051] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.645 [INFO][4076] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" HandleID="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Workload="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.651 [INFO][4076] ipam_plugin.go 268: Auto assigning IP ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" HandleID="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Workload="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050240), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-64c547b7fb-ngm72", "timestamp":"2024-02-09 19:52:17.645412914 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.651 [INFO][4076] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.651 [INFO][4076] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.651 [INFO][4076] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.652 [INFO][4076] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.653 [INFO][4076] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.657 [INFO][4076] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.657 [INFO][4076] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.659 [INFO][4076] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.659 [INFO][4076] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.659 [INFO][4076] ipam.go 1682: Creating new handle: k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692 Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.661 [INFO][4076] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.664 [INFO][4076] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.664 [INFO][4076] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" host="localhost" Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.664 [INFO][4076] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:17.682781 env[1176]: 2024-02-09 19:52:17.664 [INFO][4076] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" HandleID="k8s-pod-network.4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Workload="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.683476 env[1176]: 2024-02-09 19:52:17.667 [INFO][4051] k8s.go 385: Populated endpoint ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0", GenerateName:"calico-apiserver-64c547b7fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"83fa1c1f-c9be-4a61-bbe9-419642824c3d", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64c547b7fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-64c547b7fb-ngm72", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif6bcc9ac3a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:17.683476 env[1176]: 2024-02-09 19:52:17.667 [INFO][4051] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.683476 env[1176]: 2024-02-09 19:52:17.667 [INFO][4051] dataplane_linux.go 68: Setting the host side veth name to calif6bcc9ac3a7 ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.683476 env[1176]: 2024-02-09 19:52:17.672 [INFO][4051] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.683476 env[1176]: 2024-02-09 19:52:17.672 [INFO][4051] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0", GenerateName:"calico-apiserver-64c547b7fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"83fa1c1f-c9be-4a61-bbe9-419642824c3d", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64c547b7fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692", Pod:"calico-apiserver-64c547b7fb-ngm72", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif6bcc9ac3a7", MAC:"06:26:98:41:58:53", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:17.683476 env[1176]: 2024-02-09 19:52:17.679 [INFO][4051] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-ngm72" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--ngm72-eth0" Feb 9 19:52:17.694400 env[1176]: time="2024-02-09T19:52:17.694351780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:52:17.694400 env[1176]: time="2024-02-09T19:52:17.694380946Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:52:17.694649 env[1176]: time="2024-02-09T19:52:17.694389290Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:52:17.694649 env[1176]: time="2024-02-09T19:52:17.694605165Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692 pid=4107 runtime=io.containerd.runc.v2 Feb 9 19:52:17.717617 systemd[1]: run-containerd-runc-k8s.io-4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692-runc.Ain6nR.mount: Deactivated successfully. Feb 9 19:52:17.720178 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie1d04e1b029: link becomes ready Feb 9 19:52:17.719818 systemd-networkd[1065]: calie1d04e1b029: Link UP Feb 9 19:52:17.720316 systemd-networkd[1065]: calie1d04e1b029: Gained carrier Feb 9 19:52:17.729086 systemd[1]: Started cri-containerd-4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692.scope. Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.613 [INFO][4053] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0 calico-apiserver-64c547b7fb- calico-apiserver daf3268a-9015-49bb-9be9-09d1ebb63414 820 0 2024-02-09 19:52:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64c547b7fb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-64c547b7fb-wpbjd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie1d04e1b029 [] []}} ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.613 [INFO][4053] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.652 [INFO][4077] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" HandleID="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Workload="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.663 [INFO][4077] ipam_plugin.go 268: Auto assigning IP ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" HandleID="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Workload="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-64c547b7fb-wpbjd", "timestamp":"2024-02-09 19:52:17.652506529 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.663 [INFO][4077] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.665 [INFO][4077] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.665 [INFO][4077] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.670 [INFO][4077] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.682 [INFO][4077] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.689 [INFO][4077] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.690 [INFO][4077] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.692 [INFO][4077] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.692 [INFO][4077] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.698 [INFO][4077] ipam.go 1682: Creating new handle: k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.705 [INFO][4077] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.710 [INFO][4077] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.710 [INFO][4077] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" host="localhost" Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.710 [INFO][4077] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:17.735612 env[1176]: 2024-02-09 19:52:17.710 [INFO][4077] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" HandleID="k8s-pod-network.96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Workload="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.736463 env[1176]: 2024-02-09 19:52:17.716 [INFO][4053] k8s.go 385: Populated endpoint ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0", GenerateName:"calico-apiserver-64c547b7fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"daf3268a-9015-49bb-9be9-09d1ebb63414", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64c547b7fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-64c547b7fb-wpbjd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie1d04e1b029", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:17.736463 env[1176]: 2024-02-09 19:52:17.716 [INFO][4053] k8s.go 386: Calico CNI using IPs: [192.168.88.134/32] ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.736463 env[1176]: 2024-02-09 19:52:17.716 [INFO][4053] dataplane_linux.go 68: Setting the host side veth name to calie1d04e1b029 ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.736463 env[1176]: 2024-02-09 19:52:17.724 [INFO][4053] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.736463 env[1176]: 2024-02-09 19:52:17.725 [INFO][4053] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0", GenerateName:"calico-apiserver-64c547b7fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"daf3268a-9015-49bb-9be9-09d1ebb63414", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64c547b7fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f", Pod:"calico-apiserver-64c547b7fb-wpbjd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie1d04e1b029", MAC:"fa:4b:f8:2e:b9:92", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:17.736463 env[1176]: 2024-02-09 19:52:17.734 [INFO][4053] k8s.go 491: Wrote updated endpoint to datastore ContainerID="96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f" Namespace="calico-apiserver" Pod="calico-apiserver-64c547b7fb-wpbjd" WorkloadEndpoint="localhost-k8s-calico--apiserver--64c547b7fb--wpbjd-eth0" Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.753991 kernel: kauditd_printk_skb: 180 callbacks suppressed Feb 9 19:52:17.756623 kernel: audit: type=1400 audit(1707508337.743:1343): avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.756649 kernel: audit: type=1300 audit(1707508337.743:1343): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.756664 kernel: audit: type=1327 audit(1707508337.743:1343): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.756681 kernel: audit: type=1400 audit(1707508337.744:1344): avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.742000 audit: BPF prog-id=186 op=LOAD Feb 9 19:52:17.743000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.743000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.764482 kernel: audit: type=1300 audit(1707508337.744:1344): arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.764513 kernel: audit: type=1327 audit(1707508337.744:1344): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.769219 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.778895 kernel: audit: type=1400 audit(1707508337.744:1345): avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.780072 env[1176]: time="2024-02-09T19:52:17.780034763Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:52:17.780168 env[1176]: time="2024-02-09T19:52:17.780150463Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:52:17.780231 env[1176]: time="2024-02-09T19:52:17.780217801Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:52:17.780360 env[1176]: time="2024-02-09T19:52:17.780336175Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f pid=4156 runtime=io.containerd.runc.v2 Feb 9 19:52:17.788852 kernel: audit: type=1400 audit(1707508337.744:1345): avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.788922 kernel: audit: type=1400 audit(1707508337.744:1345): avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.791889 kernel: audit: type=1400 audit(1707508337.744:1345): avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.793503 systemd[1]: Started cri-containerd-96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f.scope. Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.744000 audit: BPF prog-id=187 op=LOAD Feb 9 19:52:17.744000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000393710 items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.749000 audit: BPF prog-id=188 op=LOAD Feb 9 19:52:17.749000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000393758 items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.760000 audit: BPF prog-id=188 op=UNLOAD Feb 9 19:52:17.760000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.760000 audit: BPF prog-id=189 op=LOAD Feb 9 19:52:17.760000 audit[4115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000393b68 items=0 ppid=4107 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463336462623534343862393633383966373532393337316631313166 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.818000 audit: BPF prog-id=190 op=LOAD Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4156 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936613137633135636334646462623036616566373332656537303438 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4156 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936613137633135636334646462623036616566373332656537303438 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit: BPF prog-id=191 op=LOAD Feb 9 19:52:17.819000 audit[4165]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000280360 items=0 ppid=4156 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936613137633135636334646462623036616566373332656537303438 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit: BPF prog-id=192 op=LOAD Feb 9 19:52:17.819000 audit[4165]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002803a8 items=0 ppid=4156 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936613137633135636334646462623036616566373332656537303438 Feb 9 19:52:17.819000 audit: BPF prog-id=192 op=UNLOAD Feb 9 19:52:17.819000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:17.819000 audit: BPF prog-id=193 op=LOAD Feb 9 19:52:17.819000 audit[4165]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002807b8 items=0 ppid=4156 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936613137633135636334646462623036616566373332656537303438 Feb 9 19:52:17.820731 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:52:17.833000 audit[4192]: NETFILTER_CFG table=filter:117 family=2 entries=97 op=nft_register_chain pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:52:17.833000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=51808 a0=3 a1=7ffe37d421e0 a2=0 a3=7ffe37d421cc items=0 ppid=3175 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:17.833000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:52:17.836166 env[1176]: time="2024-02-09T19:52:17.836139708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64c547b7fb-ngm72,Uid:83fa1c1f-c9be-4a61-bbe9-419642824c3d,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692\"" Feb 9 19:52:17.837272 env[1176]: time="2024-02-09T19:52:17.837255348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:52:17.855052 env[1176]: time="2024-02-09T19:52:17.855023565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64c547b7fb-wpbjd,Uid:daf3268a-9015-49bb-9be9-09d1ebb63414,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f\"" Feb 9 19:52:19.440086 systemd-networkd[1065]: calif6bcc9ac3a7: Gained IPv6LL Feb 9 19:52:19.762334 env[1176]: time="2024-02-09T19:52:19.753967151Z" level=info msg="StopPodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\"" Feb 9 19:52:19.760123 systemd-networkd[1065]: calie1d04e1b029: Gained IPv6LL Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.882 [WARNING][4217] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4kpxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"54d1291f-fe29-442a-b31e-c69d6ea59d02", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0", Pod:"csi-node-driver-4kpxb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie05e656b119", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.882 [INFO][4217] k8s.go 578: Cleaning up netns ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.882 [INFO][4217] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" iface="eth0" netns="" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.882 [INFO][4217] k8s.go 585: Releasing IP address(es) ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.882 [INFO][4217] utils.go 188: Calico CNI releasing IP address ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.895 [INFO][4225] ipam_plugin.go 415: Releasing address using handleID ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.895 [INFO][4225] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.895 [INFO][4225] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.898 [WARNING][4225] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.898 [INFO][4225] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.899 [INFO][4225] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:19.901671 env[1176]: 2024-02-09 19:52:19.900 [INFO][4217] k8s.go 591: Teardown processing complete. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.902027 env[1176]: time="2024-02-09T19:52:19.901684299Z" level=info msg="TearDown network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" successfully" Feb 9 19:52:19.902027 env[1176]: time="2024-02-09T19:52:19.901701263Z" level=info msg="StopPodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" returns successfully" Feb 9 19:52:19.902439 env[1176]: time="2024-02-09T19:52:19.902422141Z" level=info msg="RemovePodSandbox for \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\"" Feb 9 19:52:19.902486 env[1176]: time="2024-02-09T19:52:19.902450079Z" level=info msg="Forcibly stopping sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\"" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.924 [WARNING][4244] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4kpxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"54d1291f-fe29-442a-b31e-c69d6ea59d02", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d7bea4c09b8253251e5a453d7596ff46d2c8ea7f60d2aa3176d5c1666407c6f0", Pod:"csi-node-driver-4kpxb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie05e656b119", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.924 [INFO][4244] k8s.go 578: Cleaning up netns ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.924 [INFO][4244] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" iface="eth0" netns="" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.925 [INFO][4244] k8s.go 585: Releasing IP address(es) ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.925 [INFO][4244] utils.go 188: Calico CNI releasing IP address ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.939 [INFO][4250] ipam_plugin.go 415: Releasing address using handleID ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.939 [INFO][4250] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.939 [INFO][4250] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.943 [WARNING][4250] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.943 [INFO][4250] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" HandleID="k8s-pod-network.68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Workload="localhost-k8s-csi--node--driver--4kpxb-eth0" Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.944 [INFO][4250] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:19.946085 env[1176]: 2024-02-09 19:52:19.945 [INFO][4244] k8s.go 591: Teardown processing complete. ContainerID="68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677" Feb 9 19:52:19.946470 env[1176]: time="2024-02-09T19:52:19.946103774Z" level=info msg="TearDown network for sandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" successfully" Feb 9 19:52:19.947381 env[1176]: time="2024-02-09T19:52:19.947365694Z" level=info msg="RemovePodSandbox \"68ba209bc64956a28e07b549a362d8ffe45dcd11b377c4633dcad9220610d677\" returns successfully" Feb 9 19:52:19.947724 env[1176]: time="2024-02-09T19:52:19.947712239Z" level=info msg="StopPodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\"" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.969 [WARNING][4269] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--d549n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"59088987-6760-402f-834f-69e3c4081260", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb", Pod:"coredns-5dd5756b68-d549n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4781f507c20", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.969 [INFO][4269] k8s.go 578: Cleaning up netns ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.969 [INFO][4269] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" iface="eth0" netns="" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.969 [INFO][4269] k8s.go 585: Releasing IP address(es) ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.969 [INFO][4269] utils.go 188: Calico CNI releasing IP address ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.989 [INFO][4275] ipam_plugin.go 415: Releasing address using handleID ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.989 [INFO][4275] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.990 [INFO][4275] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.993 [WARNING][4275] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.993 [INFO][4275] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:19.999 [INFO][4275] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:20.001396 env[1176]: 2024-02-09 19:52:20.000 [INFO][4269] k8s.go 591: Teardown processing complete. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.002013 env[1176]: time="2024-02-09T19:52:20.001798701Z" level=info msg="TearDown network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" successfully" Feb 9 19:52:20.002013 env[1176]: time="2024-02-09T19:52:20.001833076Z" level=info msg="StopPodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" returns successfully" Feb 9 19:52:20.002211 env[1176]: time="2024-02-09T19:52:20.002182174Z" level=info msg="RemovePodSandbox for \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\"" Feb 9 19:52:20.002245 env[1176]: time="2024-02-09T19:52:20.002202755Z" level=info msg="Forcibly stopping sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\"" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.025 [WARNING][4293] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--d549n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"59088987-6760-402f-834f-69e3c4081260", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"293a9e9bfa411cbc59c0224a5f0f714ad9c2a8d63a5ee1793cd7a8380eaa42fb", Pod:"coredns-5dd5756b68-d549n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4781f507c20", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.025 [INFO][4293] k8s.go 578: Cleaning up netns ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.025 [INFO][4293] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" iface="eth0" netns="" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.025 [INFO][4293] k8s.go 585: Releasing IP address(es) ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.025 [INFO][4293] utils.go 188: Calico CNI releasing IP address ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.046 [INFO][4300] ipam_plugin.go 415: Releasing address using handleID ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.046 [INFO][4300] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.046 [INFO][4300] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.050 [WARNING][4300] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.050 [INFO][4300] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" HandleID="k8s-pod-network.a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Workload="localhost-k8s-coredns--5dd5756b68--d549n-eth0" Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.051 [INFO][4300] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:20.054112 env[1176]: 2024-02-09 19:52:20.052 [INFO][4293] k8s.go 591: Teardown processing complete. ContainerID="a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368" Feb 9 19:52:20.054903 env[1176]: time="2024-02-09T19:52:20.054449408Z" level=info msg="TearDown network for sandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" successfully" Feb 9 19:52:20.055952 env[1176]: time="2024-02-09T19:52:20.055924314Z" level=info msg="RemovePodSandbox \"a92866413366615792ebd8431901a2f97180516fda5cc2ef1c57986424f74368\" returns successfully" Feb 9 19:52:20.056360 env[1176]: time="2024-02-09T19:52:20.056346563Z" level=info msg="StopPodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\"" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.098 [WARNING][4319] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--dz8pl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e85eedc0-1b5c-4171-ad51-e0dd673d46dc", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3", Pod:"coredns-5dd5756b68-dz8pl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62c4621531", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.098 [INFO][4319] k8s.go 578: Cleaning up netns ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.098 [INFO][4319] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" iface="eth0" netns="" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.098 [INFO][4319] k8s.go 585: Releasing IP address(es) ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.098 [INFO][4319] utils.go 188: Calico CNI releasing IP address ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.117 [INFO][4325] ipam_plugin.go 415: Releasing address using handleID ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.117 [INFO][4325] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.117 [INFO][4325] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.128 [WARNING][4325] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.128 [INFO][4325] ipam_plugin.go 443: Releasing address using workloadID ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.129 [INFO][4325] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:20.131175 env[1176]: 2024-02-09 19:52:20.130 [INFO][4319] k8s.go 591: Teardown processing complete. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.142219 env[1176]: time="2024-02-09T19:52:20.131439857Z" level=info msg="TearDown network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" successfully" Feb 9 19:52:20.142219 env[1176]: time="2024-02-09T19:52:20.131464467Z" level=info msg="StopPodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" returns successfully" Feb 9 19:52:20.142219 env[1176]: time="2024-02-09T19:52:20.131785752Z" level=info msg="RemovePodSandbox for \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\"" Feb 9 19:52:20.142219 env[1176]: time="2024-02-09T19:52:20.131808558Z" level=info msg="Forcibly stopping sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\"" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.207 [WARNING][4344] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--dz8pl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e85eedc0-1b5c-4171-ad51-e0dd673d46dc", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eaee1401439d81d1d6ca2dc29f311e003e041635dc9cc2b15f3c1044d43fa3b3", Pod:"coredns-5dd5756b68-dz8pl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid62c4621531", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.207 [INFO][4344] k8s.go 578: Cleaning up netns ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.207 [INFO][4344] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" iface="eth0" netns="" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.214 [INFO][4344] k8s.go 585: Releasing IP address(es) ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.214 [INFO][4344] utils.go 188: Calico CNI releasing IP address ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.259 [INFO][4350] ipam_plugin.go 415: Releasing address using handleID ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.259 [INFO][4350] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.259 [INFO][4350] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.263 [WARNING][4350] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.263 [INFO][4350] ipam_plugin.go 443: Releasing address using workloadID ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" HandleID="k8s-pod-network.da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Workload="localhost-k8s-coredns--5dd5756b68--dz8pl-eth0" Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.264 [INFO][4350] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:20.271157 env[1176]: 2024-02-09 19:52:20.265 [INFO][4344] k8s.go 591: Teardown processing complete. ContainerID="da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e" Feb 9 19:52:20.272327 env[1176]: time="2024-02-09T19:52:20.272305898Z" level=info msg="TearDown network for sandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" successfully" Feb 9 19:52:20.274539 env[1176]: time="2024-02-09T19:52:20.274525366Z" level=info msg="RemovePodSandbox \"da83224098b2ca5af33c66e9990766c2035d02a896eb04f194f7719fa29c588e\" returns successfully" Feb 9 19:52:20.274858 env[1176]: time="2024-02-09T19:52:20.274846146Z" level=info msg="StopPodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\"" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.344 [WARNING][4369] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0", GenerateName:"calico-kube-controllers-844cbb97c5-", Namespace:"calico-system", SelfLink:"", UID:"b5fbc0e3-62ee-4617-a6f6-319ede7bee78", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"844cbb97c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b", Pod:"calico-kube-controllers-844cbb97c5-7k5nj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc179191788", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.344 [INFO][4369] k8s.go 578: Cleaning up netns ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.344 [INFO][4369] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" iface="eth0" netns="" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.344 [INFO][4369] k8s.go 585: Releasing IP address(es) ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.344 [INFO][4369] utils.go 188: Calico CNI releasing IP address ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.357 [INFO][4375] ipam_plugin.go 415: Releasing address using handleID ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.357 [INFO][4375] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.357 [INFO][4375] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.361 [WARNING][4375] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.361 [INFO][4375] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.362 [INFO][4375] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:20.364738 env[1176]: 2024-02-09 19:52:20.363 [INFO][4369] k8s.go 591: Teardown processing complete. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.365685 env[1176]: time="2024-02-09T19:52:20.364757334Z" level=info msg="TearDown network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" successfully" Feb 9 19:52:20.365685 env[1176]: time="2024-02-09T19:52:20.364776269Z" level=info msg="StopPodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" returns successfully" Feb 9 19:52:20.365685 env[1176]: time="2024-02-09T19:52:20.365088905Z" level=info msg="RemovePodSandbox for \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\"" Feb 9 19:52:20.365685 env[1176]: time="2024-02-09T19:52:20.365104922Z" level=info msg="Forcibly stopping sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\"" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.391 [WARNING][4394] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0", GenerateName:"calico-kube-controllers-844cbb97c5-", Namespace:"calico-system", SelfLink:"", UID:"b5fbc0e3-62ee-4617-a6f6-319ede7bee78", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 51, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"844cbb97c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2fc2262bb87946fe815887a1de2272d71ce6f47a4812c3b20a7a49a0d0fdf19b", Pod:"calico-kube-controllers-844cbb97c5-7k5nj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc179191788", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.391 [INFO][4394] k8s.go 578: Cleaning up netns ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.391 [INFO][4394] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" iface="eth0" netns="" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.391 [INFO][4394] k8s.go 585: Releasing IP address(es) ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.391 [INFO][4394] utils.go 188: Calico CNI releasing IP address ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.410 [INFO][4400] ipam_plugin.go 415: Releasing address using handleID ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.410 [INFO][4400] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.410 [INFO][4400] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.418 [WARNING][4400] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.418 [INFO][4400] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" HandleID="k8s-pod-network.9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Workload="localhost-k8s-calico--kube--controllers--844cbb97c5--7k5nj-eth0" Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.419 [INFO][4400] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:52:20.424913 env[1176]: 2024-02-09 19:52:20.424 [INFO][4394] k8s.go 591: Teardown processing complete. ContainerID="9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac" Feb 9 19:52:20.426141 env[1176]: time="2024-02-09T19:52:20.424932591Z" level=info msg="TearDown network for sandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" successfully" Feb 9 19:52:20.426500 env[1176]: time="2024-02-09T19:52:20.426482954Z" level=info msg="RemovePodSandbox \"9efe5c0ec0285cb70586e4e67c9789e3ebc96cbd33a36ecf1695e0d7621abcac\" returns successfully" Feb 9 19:52:21.566713 env[1176]: time="2024-02-09T19:52:21.566681026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.573620 env[1176]: time="2024-02-09T19:52:21.573601669Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.578439 env[1176]: time="2024-02-09T19:52:21.578423514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.583512 env[1176]: time="2024-02-09T19:52:21.583496088Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.583766 env[1176]: time="2024-02-09T19:52:21.583741747Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:52:21.584539 env[1176]: time="2024-02-09T19:52:21.584522509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:52:21.585897 env[1176]: time="2024-02-09T19:52:21.585866739Z" level=info msg="CreateContainer within sandbox \"4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:52:21.603995 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2541655014.mount: Deactivated successfully. Feb 9 19:52:21.608106 env[1176]: time="2024-02-09T19:52:21.608074662Z" level=info msg="CreateContainer within sandbox \"4c3dbb5448b96389f7529371f111f0c683a2b6b6c89f2a0706f120acbda9d692\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9197a1612399623c50aaf3f58bf0f0e370b801ee89fa2683358f0629f3a6bdf2\"" Feb 9 19:52:21.608639 env[1176]: time="2024-02-09T19:52:21.608622266Z" level=info msg="StartContainer for \"9197a1612399623c50aaf3f58bf0f0e370b801ee89fa2683358f0629f3a6bdf2\"" Feb 9 19:52:21.625281 systemd[1]: Started cri-containerd-9197a1612399623c50aaf3f58bf0f0e370b801ee89fa2683358f0629f3a6bdf2.scope. Feb 9 19:52:21.629677 systemd[1]: run-containerd-runc-k8s.io-9197a1612399623c50aaf3f58bf0f0e370b801ee89fa2683358f0629f3a6bdf2-runc.RteKxu.mount: Deactivated successfully. Feb 9 19:52:21.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit: BPF prog-id=194 op=LOAD Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4107 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393761313631323339393632336335306161663366353862663066 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4107 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393761313631323339393632336335306161663366353862663066 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit: BPF prog-id=195 op=LOAD Feb 9 19:52:21.641000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003092b0 items=0 ppid=4107 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393761313631323339393632336335306161663366353862663066 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit: BPF prog-id=196 op=LOAD Feb 9 19:52:21.641000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003092f8 items=0 ppid=4107 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393761313631323339393632336335306161663366353862663066 Feb 9 19:52:21.641000 audit: BPF prog-id=196 op=UNLOAD Feb 9 19:52:21.641000 audit: BPF prog-id=195 op=UNLOAD Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:21.641000 audit: BPF prog-id=197 op=LOAD Feb 9 19:52:21.641000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000309708 items=0 ppid=4107 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393761313631323339393632336335306161663366353862663066 Feb 9 19:52:21.664839 env[1176]: time="2024-02-09T19:52:21.664802862Z" level=info msg="StartContainer for \"9197a1612399623c50aaf3f58bf0f0e370b801ee89fa2683358f0629f3a6bdf2\" returns successfully" Feb 9 19:52:21.818457 kubelet[2128]: I0209 19:52:21.818395 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64c547b7fb-ngm72" podStartSLOduration=3.071320605 podCreationTimestamp="2024-02-09 19:52:15 +0000 UTC" firstStartedPulling="2024-02-09 19:52:17.836939081 +0000 UTC m=+58.330193155" lastFinishedPulling="2024-02-09 19:52:21.583978788 +0000 UTC m=+62.077232869" observedRunningTime="2024-02-09 19:52:21.814824589 +0000 UTC m=+62.308078672" watchObservedRunningTime="2024-02-09 19:52:21.818360319 +0000 UTC m=+62.311614397" Feb 9 19:52:21.898000 audit[4444]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:21.898000 audit[4444]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff1a61ec40 a2=0 a3=7fff1a61ec2c items=0 ppid=2261 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:21.898000 audit[4444]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:21.898000 audit[4444]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff1a61ec40 a2=0 a3=7fff1a61ec2c items=0 ppid=2261 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:21.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:21.945000 audit[4424]: AVC avc: denied { watch } for pid=4424 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_52_16.438125674/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c728 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c475,c728 tclass=file permissive=0 Feb 9 19:52:21.945000 audit[4424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e9f040 a2=fc6 a3=0 items=0 ppid=4107 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c728 key=(null) Feb 9 19:52:21.945000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:52:21.987085 env[1176]: time="2024-02-09T19:52:21.987046293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.987816 env[1176]: time="2024-02-09T19:52:21.987799679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.988740 env[1176]: time="2024-02-09T19:52:21.988726994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.989663 env[1176]: time="2024-02-09T19:52:21.989647020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:52:21.990136 env[1176]: time="2024-02-09T19:52:21.990121591Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:52:21.991364 env[1176]: time="2024-02-09T19:52:21.991349512Z" level=info msg="CreateContainer within sandbox \"96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:52:22.007152 env[1176]: time="2024-02-09T19:52:22.007120999Z" level=info msg="CreateContainer within sandbox \"96a17c15cc4ddbb06aef732ee7048abe03fb2681d4d678b8ec89db6fd5faf50f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7436e95c873c3268b7123da1413f85bdee6a5b53c92ee8f41562513e412e6ef8\"" Feb 9 19:52:22.007743 env[1176]: time="2024-02-09T19:52:22.007729219Z" level=info msg="StartContainer for \"7436e95c873c3268b7123da1413f85bdee6a5b53c92ee8f41562513e412e6ef8\"" Feb 9 19:52:22.019107 systemd[1]: Started cri-containerd-7436e95c873c3268b7123da1413f85bdee6a5b53c92ee8f41562513e412e6ef8.scope. Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit: BPF prog-id=198 op=LOAD Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4156 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734333665393563383733633332363862373132336461313431336638 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=4156 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734333665393563383733633332363862373132336461313431336638 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit: BPF prog-id=199 op=LOAD Feb 9 19:52:22.030000 audit[4453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00025eae0 items=0 ppid=4156 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734333665393563383733633332363862373132336461313431336638 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit: BPF prog-id=200 op=LOAD Feb 9 19:52:22.030000 audit[4453]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00025eb28 items=0 ppid=4156 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734333665393563383733633332363862373132336461313431336638 Feb 9 19:52:22.030000 audit: BPF prog-id=200 op=UNLOAD Feb 9 19:52:22.030000 audit: BPF prog-id=199 op=UNLOAD Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { perfmon } for pid=4453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit[4453]: AVC avc: denied { bpf } for pid=4453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:22.030000 audit: BPF prog-id=201 op=LOAD Feb 9 19:52:22.030000 audit[4453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00025ef38 items=0 ppid=4156 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734333665393563383733633332363862373132336461313431336638 Feb 9 19:52:22.058807 env[1176]: time="2024-02-09T19:52:22.058777393Z" level=info msg="StartContainer for \"7436e95c873c3268b7123da1413f85bdee6a5b53c92ee8f41562513e412e6ef8\" returns successfully" Feb 9 19:52:22.474000 audit[4464]: AVC avc: denied { watch } for pid=4464 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_52_16.4263037856/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c1000 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c225,c1000 tclass=file permissive=0 Feb 9 19:52:22.474000 audit[4464]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000be4140 a2=fc6 a3=0 items=0 ppid=4156 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c1000 key=(null) Feb 9 19:52:22.474000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:52:22.906905 kernel: kauditd_printk_skb: 222 callbacks suppressed Feb 9 19:52:22.906993 kernel: audit: type=1325 audit(1707508342.903:1409): table=filter:120 family=2 entries=10 op=nft_register_rule pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:22.907014 kernel: audit: type=1300 audit(1707508342.903:1409): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffea24a6bb0 a2=0 a3=7ffea24a6b9c items=0 ppid=2261 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.903000 audit[4493]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:22.911841 kernel: audit: type=1327 audit(1707508342.903:1409): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:22.903000 audit[4493]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffea24a6bb0 a2=0 a3=7ffea24a6b9c items=0 ppid=2261 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:22.912541 kernel: audit: type=1325 audit(1707508342.903:1410): table=nat:121 family=2 entries=20 op=nft_register_rule pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:22.903000 audit[4493]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:22.903000 audit[4493]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffea24a6bb0 a2=0 a3=7ffea24a6b9c items=0 ppid=2261 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.918539 kernel: audit: type=1300 audit(1707508342.903:1410): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffea24a6bb0 a2=0 a3=7ffea24a6b9c items=0 ppid=2261 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:22.918568 kernel: audit: type=1327 audit(1707508342.903:1410): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:22.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:24.799334 systemd[1]: run-containerd-runc-k8s.io-7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1-runc.cyofuy.mount: Deactivated successfully. Feb 9 19:52:31.243000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.244000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.253632 kernel: audit: type=1400 audit(1707508351.243:1411): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.253699 kernel: audit: type=1400 audit(1707508351.244:1412): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.244000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a7b160 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.259402 kernel: audit: type=1300 audit(1707508351.244:1412): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a7b160 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.244000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:31.263894 kernel: audit: type=1327 audit(1707508351.244:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:31.263939 kernel: audit: type=1300 audit(1707508351.243:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bb5700 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.243000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bb5700 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.243000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:31.272375 kernel: audit: type=1327 audit(1707508351.243:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:31.272420 kernel: audit: type=1400 audit(1707508351.246:1413): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.246000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.246000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bb5720 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.279674 kernel: audit: type=1300 audit(1707508351.246:1413): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bb5720 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.279715 kernel: audit: type=1327 audit(1707508351.246:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:31.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:31.256000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.286111 kernel: audit: type=1400 audit(1707508351.256:1414): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:52:31.256000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bb5840 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:52:31.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:52:40.968822 systemd[1]: run-containerd-runc-k8s.io-23228bfc938e049f829b8a74048d37fff484a9fafc469b7bca80dc11107114e1-runc.YlmpxP.mount: Deactivated successfully. Feb 9 19:52:42.312540 systemd[1]: run-containerd-runc-k8s.io-7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1-runc.COui66.mount: Deactivated successfully. Feb 9 19:52:44.331604 systemd[1]: Started sshd@7-139.178.70.108:22-139.178.89.65:48136.service. Feb 9 19:52:44.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-139.178.89.65:48136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.341004 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:52:44.341048 kernel: audit: type=1130 audit(1707508364.330:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-139.178.89.65:48136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.613000 audit[4580]: USER_ACCT pid=4580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.624587 kernel: audit: type=1101 audit(1707508364.613:1416): pid=4580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.636518 kernel: audit: type=1103 audit(1707508364.620:1417): pid=4580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.636563 kernel: audit: type=1006 audit(1707508364.620:1418): pid=4580 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:52:44.636580 kernel: audit: type=1300 audit(1707508364.620:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3d88de0 a2=3 a3=0 items=0 ppid=1 pid=4580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:44.636598 kernel: audit: type=1327 audit(1707508364.620:1418): proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:44.620000 audit[4580]: CRED_ACQ pid=4580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.620000 audit[4580]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3d88de0 a2=3 a3=0 items=0 ppid=1 pid=4580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:44.620000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:44.647049 sshd[4580]: Accepted publickey for core from 139.178.89.65 port 48136 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:52:44.645924 sshd[4580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:44.752524 systemd-logind[1145]: New session 10 of user core. Feb 9 19:52:44.753532 systemd[1]: Started session-10.scope. Feb 9 19:52:44.757000 audit[4580]: USER_START pid=4580 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.764347 kernel: audit: type=1105 audit(1707508364.757:1419): pid=4580 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.764422 kernel: audit: type=1103 audit(1707508364.763:1420): pid=4582 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:44.763000 audit[4582]: CRED_ACQ pid=4582 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:45.716789 sshd[4580]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:45.716000 audit[4580]: USER_END pid=4580 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:45.719000 audit[4580]: CRED_DISP pid=4580 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:45.724476 kernel: audit: type=1106 audit(1707508365.716:1421): pid=4580 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:45.724548 kernel: audit: type=1104 audit(1707508365.719:1422): pid=4580 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:45.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.108:22-139.178.89.65:48136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:45.724907 systemd[1]: sshd@7-139.178.70.108:22-139.178.89.65:48136.service: Deactivated successfully. Feb 9 19:52:45.725544 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:52:45.726351 systemd-logind[1145]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:52:45.727411 systemd-logind[1145]: Removed session 10. Feb 9 19:52:47.217162 systemd[1]: run-containerd-runc-k8s.io-7436e95c873c3268b7123da1413f85bdee6a5b53c92ee8f41562513e412e6ef8-runc.PDQ8Ke.mount: Deactivated successfully. Feb 9 19:52:47.347700 kubelet[2128]: I0209 19:52:47.347674 2128 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64c547b7fb-wpbjd" podStartSLOduration=28.212959734000002 podCreationTimestamp="2024-02-09 19:52:15 +0000 UTC" firstStartedPulling="2024-02-09 19:52:17.855647637 +0000 UTC m=+58.348901711" lastFinishedPulling="2024-02-09 19:52:21.990288614 +0000 UTC m=+62.483542689" observedRunningTime="2024-02-09 19:52:22.832459978 +0000 UTC m=+63.325714061" watchObservedRunningTime="2024-02-09 19:52:47.347600712 +0000 UTC m=+87.840854796" Feb 9 19:52:47.497000 audit[4630]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:47.497000 audit[4630]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcb4001010 a2=0 a3=7ffcb4000ffc items=0 ppid=2261 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:47.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:47.499000 audit[4630]: NETFILTER_CFG table=nat:123 family=2 entries=31 op=nft_register_chain pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:47.499000 audit[4630]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffcb4001010 a2=0 a3=7ffcb4000ffc items=0 ppid=2261 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:47.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:47.511000 audit[4632]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:47.511000 audit[4632]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc97395010 a2=0 a3=7ffc97394ffc items=0 ppid=2261 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:47.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:47.512000 audit[4632]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:52:47.512000 audit[4632]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc97395010 a2=0 a3=7ffc97394ffc items=0 ppid=2261 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:47.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:52:50.720250 systemd[1]: Started sshd@8-139.178.70.108:22-139.178.89.65:38382.service. Feb 9 19:52:50.730427 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:52:50.736261 kernel: audit: type=1130 audit(1707508370.719:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-139.178.89.65:38382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:50.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-139.178.89.65:38382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:50.794000 audit[4634]: USER_ACCT pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.798536 sshd[4634]: Accepted publickey for core from 139.178.89.65 port 38382 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:52:50.798897 kernel: audit: type=1101 audit(1707508370.794:1429): pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.798000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.799652 sshd[4634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:50.805325 kernel: audit: type=1103 audit(1707508370.798:1430): pid=4634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.805463 kernel: audit: type=1006 audit(1707508370.798:1431): pid=4634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:52:50.798000 audit[4634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd756cbde0 a2=3 a3=0 items=0 ppid=1 pid=4634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:50.810941 kernel: audit: type=1300 audit(1707508370.798:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd756cbde0 a2=3 a3=0 items=0 ppid=1 pid=4634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:50.810979 kernel: audit: type=1327 audit(1707508370.798:1431): proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:50.820609 kernel: audit: type=1105 audit(1707508370.815:1432): pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.798000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:50.815000 audit[4634]: USER_START pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.813306 systemd[1]: Started session-11.scope. Feb 9 19:52:50.830423 kernel: audit: type=1103 audit(1707508370.820:1433): pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.820000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:50.813816 systemd-logind[1145]: New session 11 of user core. Feb 9 19:52:51.132501 sshd[4634]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:51.132000 audit[4634]: USER_END pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:51.134218 systemd[1]: sshd@8-139.178.70.108:22-139.178.89.65:38382.service: Deactivated successfully. Feb 9 19:52:51.134891 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:52:51.137339 systemd-logind[1145]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:52:51.132000 audit[4634]: CRED_DISP pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:51.140763 kernel: audit: type=1106 audit(1707508371.132:1434): pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:51.141450 kernel: audit: type=1104 audit(1707508371.132:1435): pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:51.141221 systemd-logind[1145]: Removed session 11. Feb 9 19:52:51.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.108:22-139.178.89.65:38382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:54.770774 systemd[1]: run-containerd-runc-k8s.io-7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1-runc.zITtcM.mount: Deactivated successfully. Feb 9 19:52:56.129221 systemd[1]: Started sshd@9-139.178.70.108:22-139.178.89.65:38396.service. Feb 9 19:52:56.134073 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:52:56.134117 kernel: audit: type=1130 audit(1707508376.128:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-139.178.89.65:38396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:56.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-139.178.89.65:38396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:56.188000 audit[4668]: USER_ACCT pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.197929 kernel: audit: type=1101 audit(1707508376.188:1438): pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.201034 kernel: audit: type=1103 audit(1707508376.191:1439): pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.207244 kernel: audit: type=1006 audit(1707508376.191:1440): pid=4668 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:52:56.207292 kernel: audit: type=1300 audit(1707508376.191:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc513038e0 a2=3 a3=0 items=0 ppid=1 pid=4668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:56.207317 kernel: audit: type=1327 audit(1707508376.191:1440): proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:56.191000 audit[4668]: CRED_ACQ pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.191000 audit[4668]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc513038e0 a2=3 a3=0 items=0 ppid=1 pid=4668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:56.224191 kernel: audit: type=1105 audit(1707508376.209:1441): pid=4668 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.231010 kernel: audit: type=1103 audit(1707508376.213:1442): pid=4670 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:56.209000 audit[4668]: USER_START pid=4668 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.213000 audit[4670]: CRED_ACQ pid=4670 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.231158 sshd[4668]: Accepted publickey for core from 139.178.89.65 port 38396 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:52:56.196259 sshd[4668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:56.204172 systemd-logind[1145]: New session 12 of user core. Feb 9 19:52:56.205012 systemd[1]: Started session-12.scope. Feb 9 19:52:56.330570 sshd[4668]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:56.330000 audit[4668]: USER_END pid=4668 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.342175 kernel: audit: type=1106 audit(1707508376.330:1443): pid=4668 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.342208 kernel: audit: type=1104 audit(1707508376.330:1444): pid=4668 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.330000 audit[4668]: CRED_DISP pid=4668 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.108:22-139.178.89.65:38396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:56.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.108:22-139.178.89.65:38406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:56.335985 systemd[1]: sshd@9-139.178.70.108:22-139.178.89.65:38396.service: Deactivated successfully. Feb 9 19:52:56.336334 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:52:56.339567 systemd-logind[1145]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:52:56.341641 systemd[1]: Started sshd@10-139.178.70.108:22-139.178.89.65:38406.service. Feb 9 19:52:56.342947 systemd-logind[1145]: Removed session 12. Feb 9 19:52:56.378000 audit[4681]: USER_ACCT pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.380276 sshd[4681]: Accepted publickey for core from 139.178.89.65 port 38406 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:52:56.379000 audit[4681]: CRED_ACQ pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.380000 audit[4681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffb378100 a2=3 a3=0 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:56.380000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:56.383906 systemd[1]: Started session-13.scope. Feb 9 19:52:56.381055 sshd[4681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:56.384915 systemd-logind[1145]: New session 13 of user core. Feb 9 19:52:56.386000 audit[4681]: USER_START pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:56.387000 audit[4683]: CRED_ACQ pid=4683 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-139.178.89.65:38422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.449645 systemd[1]: Started sshd@11-139.178.70.108:22-139.178.89.65:38422.service. Feb 9 19:52:57.462988 sshd[4681]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:57.469000 audit[4681]: USER_END pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.470000 audit[4681]: CRED_DISP pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.487749 systemd[1]: sshd@10-139.178.70.108:22-139.178.89.65:38406.service: Deactivated successfully. Feb 9 19:52:57.488319 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:52:57.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.108:22-139.178.89.65:38406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.488972 systemd-logind[1145]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:52:57.489523 systemd-logind[1145]: Removed session 13. Feb 9 19:52:57.678000 audit[4694]: USER_ACCT pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.679791 sshd[4694]: Accepted publickey for core from 139.178.89.65 port 38422 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:52:57.679000 audit[4694]: CRED_ACQ pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.679000 audit[4694]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d8eb700 a2=3 a3=0 items=0 ppid=1 pid=4694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:57.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:57.683678 sshd[4694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:57.686922 systemd-logind[1145]: New session 14 of user core. Feb 9 19:52:57.687648 systemd[1]: Started session-14.scope. Feb 9 19:52:57.690000 audit[4694]: USER_START pid=4694 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.691000 audit[4697]: CRED_ACQ pid=4697 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.860715 sshd[4694]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:57.860000 audit[4694]: USER_END pid=4694 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.860000 audit[4694]: CRED_DISP pid=4694 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:52:57.862217 systemd-logind[1145]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:52:57.862379 systemd[1]: sshd@11-139.178.70.108:22-139.178.89.65:38422.service: Deactivated successfully. Feb 9 19:52:57.862913 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:52:57.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.108:22-139.178.89.65:38422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.863560 systemd-logind[1145]: Removed session 14. Feb 9 19:53:02.865045 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:53:02.865163 kernel: audit: type=1130 audit(1707508382.863:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-139.178.89.65:57898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:02.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-139.178.89.65:57898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:02.864149 systemd[1]: Started sshd@12-139.178.70.108:22-139.178.89.65:57898.service. Feb 9 19:53:02.891000 audit[4713]: USER_ACCT pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.893030 sshd[4713]: Accepted publickey for core from 139.178.89.65 port 57898 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:02.896898 kernel: audit: type=1101 audit(1707508382.891:1465): pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.897000 audit[4713]: CRED_ACQ pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.898315 sshd[4713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:02.903927 kernel: audit: type=1103 audit(1707508382.897:1466): pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.904024 kernel: audit: type=1006 audit(1707508382.897:1467): pid=4713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 19:53:02.897000 audit[4713]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5bd51800 a2=3 a3=0 items=0 ppid=1 pid=4713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:02.908060 kernel: audit: type=1300 audit(1707508382.897:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5bd51800 a2=3 a3=0 items=0 ppid=1 pid=4713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:02.897000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:02.909957 kernel: audit: type=1327 audit(1707508382.897:1467): proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:02.912289 systemd-logind[1145]: New session 15 of user core. Feb 9 19:53:02.913494 systemd[1]: Started session-15.scope. Feb 9 19:53:02.916000 audit[4713]: USER_START pid=4713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.920000 audit[4715]: CRED_ACQ pid=4715 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.925191 kernel: audit: type=1105 audit(1707508382.916:1468): pid=4713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:02.925309 kernel: audit: type=1103 audit(1707508382.920:1469): pid=4715 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:03.014976 sshd[4713]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:03.014000 audit[4713]: USER_END pid=4713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:03.019573 systemd[1]: sshd@12-139.178.70.108:22-139.178.89.65:57898.service: Deactivated successfully. Feb 9 19:53:03.019987 kernel: audit: type=1106 audit(1707508383.014:1470): pid=4713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:03.020069 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:53:03.015000 audit[4713]: CRED_DISP pid=4713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:03.020468 systemd-logind[1145]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:53:03.024016 kernel: audit: type=1104 audit(1707508383.015:1471): pid=4713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:03.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.108:22-139.178.89.65:57898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:03.023754 systemd-logind[1145]: Removed session 15. Feb 9 19:53:08.017236 systemd[1]: Started sshd@13-139.178.70.108:22-139.178.89.65:57902.service. Feb 9 19:53:08.030019 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:53:08.030066 kernel: audit: type=1130 audit(1707508388.016:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.108:22-139.178.89.65:57902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:08.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.108:22-139.178.89.65:57902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:08.120000 audit[4728]: USER_ACCT pid=4728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.121990 sshd[4728]: Accepted publickey for core from 139.178.89.65 port 57902 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:08.124942 kernel: audit: type=1101 audit(1707508388.120:1474): pid=4728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.124000 audit[4728]: CRED_ACQ pid=4728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.139301 kernel: audit: type=1103 audit(1707508388.124:1475): pid=4728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.139338 kernel: audit: type=1006 audit(1707508388.124:1476): pid=4728 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:53:08.139355 kernel: audit: type=1300 audit(1707508388.124:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff595af300 a2=3 a3=0 items=0 ppid=1 pid=4728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:08.139370 kernel: audit: type=1327 audit(1707508388.124:1476): proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:08.139383 kernel: audit: type=1105 audit(1707508388.134:1477): pid=4728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.139399 kernel: audit: type=1103 audit(1707508388.135:1478): pid=4730 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.124000 audit[4728]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff595af300 a2=3 a3=0 items=0 ppid=1 pid=4728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:08.124000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:08.134000 audit[4728]: USER_START pid=4728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.135000 audit[4730]: CRED_ACQ pid=4730 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.125220 sshd[4728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:08.131931 systemd[1]: Started session-16.scope. Feb 9 19:53:08.132540 systemd-logind[1145]: New session 16 of user core. Feb 9 19:53:08.275643 sshd[4728]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:08.275000 audit[4728]: USER_END pid=4728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.280687 systemd-logind[1145]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:53:08.280927 kernel: audit: type=1106 audit(1707508388.275:1479): pid=4728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.275000 audit[4728]: CRED_DISP pid=4728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:08.281655 systemd[1]: sshd@13-139.178.70.108:22-139.178.89.65:57902.service: Deactivated successfully. Feb 9 19:53:08.282093 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:53:08.282874 systemd-logind[1145]: Removed session 16. Feb 9 19:53:08.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.108:22-139.178.89.65:57902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:08.288501 kernel: audit: type=1104 audit(1707508388.275:1480): pid=4728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.268777 systemd[1]: Started sshd@14-139.178.70.108:22-139.178.89.65:33050.service. Feb 9 19:53:13.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.108:22-139.178.89.65:33050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:13.269958 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:53:13.272965 kernel: audit: type=1130 audit(1707508393.268:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.108:22-139.178.89.65:33050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:13.579000 audit[4762]: USER_ACCT pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.580714 sshd[4762]: Accepted publickey for core from 139.178.89.65 port 33050 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:13.595537 kernel: audit: type=1101 audit(1707508393.579:1483): pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.595591 kernel: audit: type=1103 audit(1707508393.585:1484): pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.595615 kernel: audit: type=1006 audit(1707508393.585:1485): pid=4762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:53:13.595631 kernel: audit: type=1300 audit(1707508393.585:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7f1b63b0 a2=3 a3=0 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:13.602951 kernel: audit: type=1327 audit(1707508393.585:1485): proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:13.585000 audit[4762]: CRED_ACQ pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.585000 audit[4762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7f1b63b0 a2=3 a3=0 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:13.612050 kernel: audit: type=1105 audit(1707508393.602:1486): pid=4762 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.612090 kernel: audit: type=1103 audit(1707508393.603:1487): pid=4764 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:13.602000 audit[4762]: USER_START pid=4762 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.603000 audit[4764]: CRED_ACQ pid=4764 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.595837 sshd[4762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:13.598976 systemd-logind[1145]: New session 17 of user core. Feb 9 19:53:13.599537 systemd[1]: Started session-17.scope. Feb 9 19:53:13.943035 sshd[4762]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:13.942000 audit[4762]: USER_END pid=4762 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.949373 kernel: audit: type=1106 audit(1707508393.942:1488): pid=4762 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.944712 systemd[1]: sshd@14-139.178.70.108:22-139.178.89.65:33050.service: Deactivated successfully. Feb 9 19:53:13.949085 systemd-logind[1145]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:53:13.949099 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:53:13.950263 systemd-logind[1145]: Removed session 17. Feb 9 19:53:13.942000 audit[4762]: CRED_DISP pid=4762 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:13.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.108:22-139.178.89.65:33050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:13.954247 kernel: audit: type=1104 audit(1707508393.942:1489): pid=4762 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:16.474000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.474000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023fe8d0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:16.474000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:16.483000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.483000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028d63a0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:16.483000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:16.665000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.665000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c015144660 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:53:16.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:53:16.683000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.683000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0152507c0 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:53:16.683000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:53:16.689000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.689000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0150779e0 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:53:16.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:53:16.689000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.689000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c015077a40 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:53:16.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:53:16.693000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.693000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c015144720 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:53:16.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:53:16.693000 audit[1985]: AVC avc: denied { watch } for pid=1985 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:16.693000 audit[1985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c014e39f40 a2=fc6 a3=0 items=0 ppid=1839 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c494 key=(null) Feb 9 19:53:16.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 9 19:53:17.226752 systemd[1]: run-containerd-runc-k8s.io-9197a1612399623c50aaf3f58bf0f0e370b801ee89fa2683358f0629f3a6bdf2-runc.l8e9Un.mount: Deactivated successfully. Feb 9 19:53:18.947192 systemd[1]: Started sshd@15-139.178.70.108:22-139.178.89.65:55888.service. Feb 9 19:53:18.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.108:22-139.178.89.65:55888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:18.948435 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:53:18.951555 kernel: audit: type=1130 audit(1707508398.946:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.108:22-139.178.89.65:55888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:19.013000 audit[4817]: USER_ACCT pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.017573 sshd[4817]: Accepted publickey for core from 139.178.89.65 port 55888 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:19.018132 kernel: audit: type=1101 audit(1707508399.013:1500): pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.018000 audit[4817]: CRED_ACQ pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.022107 sshd[4817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:19.023896 kernel: audit: type=1103 audit(1707508399.018:1501): pid=4817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.023940 kernel: audit: type=1006 audit(1707508399.018:1502): pid=4817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 19:53:19.023984 kernel: audit: type=1300 audit(1707508399.018:1502): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9c3baed0 a2=3 a3=0 items=0 ppid=1 pid=4817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.018000 audit[4817]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9c3baed0 a2=3 a3=0 items=0 ppid=1 pid=4817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:19.027087 systemd[1]: Started session-18.scope. Feb 9 19:53:19.027993 systemd-logind[1145]: New session 18 of user core. Feb 9 19:53:19.028296 kernel: audit: type=1327 audit(1707508399.018:1502): proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:19.030000 audit[4817]: USER_START pid=4817 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.034903 kernel: audit: type=1105 audit(1707508399.030:1503): pid=4817 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.031000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.038948 kernel: audit: type=1103 audit(1707508399.031:1504): pid=4819 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.205402 sshd[4817]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:19.208000 audit[4817]: USER_END pid=4817 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.208000 audit[4817]: CRED_DISP pid=4817 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.213419 systemd[1]: Started sshd@16-139.178.70.108:22-139.178.89.65:55890.service. Feb 9 19:53:19.214000 systemd[1]: sshd@15-139.178.70.108:22-139.178.89.65:55888.service: Deactivated successfully. Feb 9 19:53:19.214814 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:53:19.215648 kernel: audit: type=1106 audit(1707508399.208:1505): pid=4817 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.215691 kernel: audit: type=1104 audit(1707508399.208:1506): pid=4817 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.215776 systemd-logind[1145]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:53:19.216632 systemd-logind[1145]: Removed session 18. Feb 9 19:53:19.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.108:22-139.178.89.65:55890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:19.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.108:22-139.178.89.65:55888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:19.242675 sshd[4829]: Accepted publickey for core from 139.178.89.65 port 55890 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:19.243534 sshd[4829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:19.241000 audit[4829]: USER_ACCT pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.242000 audit[4829]: CRED_ACQ pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.242000 audit[4829]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc97fe4b10 a2=3 a3=0 items=0 ppid=1 pid=4829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:19.246725 systemd-logind[1145]: New session 19 of user core. Feb 9 19:53:19.247792 systemd[1]: Started session-19.scope. Feb 9 19:53:19.250000 audit[4829]: USER_START pid=4829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.251000 audit[4832]: CRED_ACQ pid=4832 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.108:22-139.178.89.65:55894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:19.750995 systemd[1]: Started sshd@17-139.178.70.108:22-139.178.89.65:55894.service. Feb 9 19:53:19.750487 sshd[4829]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:19.755000 audit[4829]: USER_END pid=4829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.756000 audit[4829]: CRED_DISP pid=4829 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.108:22-139.178.89.65:55890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:19.761798 systemd[1]: sshd@16-139.178.70.108:22-139.178.89.65:55890.service: Deactivated successfully. Feb 9 19:53:19.762279 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:53:19.763701 systemd-logind[1145]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:53:19.764606 systemd-logind[1145]: Removed session 19. Feb 9 19:53:19.812000 audit[4841]: USER_ACCT pid=4841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.813241 sshd[4841]: Accepted publickey for core from 139.178.89.65 port 55894 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:19.813000 audit[4841]: CRED_ACQ pid=4841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.813000 audit[4841]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a62aa30 a2=3 a3=0 items=0 ppid=1 pid=4841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.813000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:19.815929 sshd[4841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:19.819958 systemd[1]: Started session-20.scope. Feb 9 19:53:19.821093 systemd-logind[1145]: New session 20 of user core. Feb 9 19:53:19.823000 audit[4841]: USER_START pid=4841 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:19.824000 audit[4844]: CRED_ACQ pid=4844 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.108:22-139.178.89.65:55910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:21.136584 systemd[1]: Started sshd@18-139.178.70.108:22-139.178.89.65:55910.service. Feb 9 19:53:21.146103 sshd[4841]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:21.149000 audit[4841]: USER_END pid=4841 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.150000 audit[4841]: CRED_DISP pid=4841 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.108:22-139.178.89.65:55894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:21.159394 systemd[1]: sshd@17-139.178.70.108:22-139.178.89.65:55894.service: Deactivated successfully. Feb 9 19:53:21.159920 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:53:21.161506 systemd-logind[1145]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:53:21.162236 systemd-logind[1145]: Removed session 20. Feb 9 19:53:21.178000 audit[4854]: USER_ACCT pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.179989 sshd[4854]: Accepted publickey for core from 139.178.89.65 port 55910 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:21.179000 audit[4854]: CRED_ACQ pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.180000 audit[4854]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1cdffe40 a2=3 a3=0 items=0 ppid=1 pid=4854 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:21.181193 sshd[4854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:21.184507 systemd[1]: Started session-21.scope. Feb 9 19:53:21.184955 systemd-logind[1145]: New session 21 of user core. Feb 9 19:53:21.188000 audit[4854]: USER_START pid=4854 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.189000 audit[4858]: CRED_ACQ pid=4858 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.233000 audit[4859]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=4859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:21.233000 audit[4859]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff5c22ae20 a2=0 a3=7fff5c22ae0c items=0 ppid=2261 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:21.233000 audit[4859]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=4859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:21.233000 audit[4859]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fff5c22ae20 a2=0 a3=31030 items=0 ppid=2261 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:21.243000 audit[4862]: NETFILTER_CFG table=filter:128 family=2 entries=32 op=nft_register_rule pid=4862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:21.243000 audit[4862]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc0869da00 a2=0 a3=7ffc0869d9ec items=0 ppid=2261 pid=4862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:21.243000 audit[4862]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=4862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:21.243000 audit[4862]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc0869da00 a2=0 a3=31030 items=0 ppid=2261 pid=4862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:21.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.108:22-139.178.89.65:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:21.753287 systemd[1]: Started sshd@19-139.178.70.108:22-139.178.89.65:55912.service. Feb 9 19:53:21.756433 sshd[4854]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:21.758000 audit[4854]: USER_END pid=4854 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.758000 audit[4854]: CRED_DISP pid=4854 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.108:22-139.178.89.65:55910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:21.760164 systemd[1]: sshd@18-139.178.70.108:22-139.178.89.65:55910.service: Deactivated successfully. Feb 9 19:53:21.760850 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:53:21.762058 systemd-logind[1145]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:53:21.762907 systemd-logind[1145]: Removed session 21. Feb 9 19:53:21.815000 audit[4868]: USER_ACCT pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.816122 sshd[4868]: Accepted publickey for core from 139.178.89.65 port 55912 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:21.816000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.816000 audit[4868]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4c2dcda0 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.816000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:21.818120 sshd[4868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:21.820762 systemd-logind[1145]: New session 22 of user core. Feb 9 19:53:21.821306 systemd[1]: Started session-22.scope. Feb 9 19:53:21.823000 audit[4868]: USER_START pid=4868 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.824000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.916496 sshd[4868]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:21.916000 audit[4868]: USER_END pid=4868 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.916000 audit[4868]: CRED_DISP pid=4868 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:21.918369 systemd-logind[1145]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:53:21.918463 systemd[1]: sshd@19-139.178.70.108:22-139.178.89.65:55912.service: Deactivated successfully. Feb 9 19:53:21.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.108:22-139.178.89.65:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:21.918887 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:53:21.919384 systemd-logind[1145]: Removed session 22. Feb 9 19:53:21.975000 audit[4424]: AVC avc: denied { watch } for pid=4424 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_52_16.438125674/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c728 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c475,c728 tclass=file permissive=0 Feb 9 19:53:21.975000 audit[4424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a22480 a2=fc6 a3=0 items=0 ppid=4107 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c728 key=(null) Feb 9 19:53:21.975000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:53:22.475000 audit[4464]: AVC avc: denied { watch } for pid=4464 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_52_16.4263037856/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c1000 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c225,c1000 tclass=file permissive=0 Feb 9 19:53:22.475000 audit[4464]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7b8e0 a2=fc6 a3=0 items=0 ppid=4156 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c1000 key=(null) Feb 9 19:53:22.475000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:53:24.767617 systemd[1]: run-containerd-runc-k8s.io-7d89d5c99dbc8302105ee59959ce1ce7428648480a29a1e29e997895971c58f1-runc.LhddIx.mount: Deactivated successfully. Feb 9 19:53:25.787000 audit[4906]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:25.790746 kernel: kauditd_printk_skb: 63 callbacks suppressed Feb 9 19:53:25.790785 kernel: audit: type=1325 audit(1707508405.787:1550): table=filter:130 family=2 entries=20 op=nft_register_rule pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:25.790813 kernel: audit: type=1300 audit(1707508405.787:1550): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffb2d38cb0 a2=0 a3=7fffb2d38c9c items=0 ppid=2261 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:25.787000 audit[4906]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffb2d38cb0 a2=0 a3=7fffb2d38c9c items=0 ppid=2261 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:25.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:25.796626 kernel: audit: type=1327 audit(1707508405.787:1550): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:25.790000 audit[4906]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:25.790000 audit[4906]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fffb2d38cb0 a2=0 a3=7fffb2d38c9c items=0 ppid=2261 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:25.803266 kernel: audit: type=1325 audit(1707508405.790:1551): table=nat:131 family=2 entries=106 op=nft_register_chain pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:25.803305 kernel: audit: type=1300 audit(1707508405.790:1551): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fffb2d38cb0 a2=0 a3=7fffb2d38c9c items=0 ppid=2261 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:25.803326 kernel: audit: type=1327 audit(1707508405.790:1551): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:25.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:26.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.108:22-139.178.89.65:55918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:26.920767 systemd[1]: Started sshd@20-139.178.70.108:22-139.178.89.65:55918.service. Feb 9 19:53:26.923981 kernel: audit: type=1130 audit(1707508406.920:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.108:22-139.178.89.65:55918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:26.976000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:26.978901 sshd[4910]: Accepted publickey for core from 139.178.89.65 port 55918 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:26.980000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:26.982093 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:26.984299 kernel: audit: type=1101 audit(1707508406.976:1553): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:26.984337 kernel: audit: type=1103 audit(1707508406.980:1554): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:26.986437 kernel: audit: type=1006 audit(1707508406.980:1555): pid=4910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:53:26.980000 audit[4910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff193e9230 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:26.980000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:26.988400 systemd-logind[1145]: New session 23 of user core. Feb 9 19:53:26.989202 systemd[1]: Started session-23.scope. Feb 9 19:53:26.991000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:26.992000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:27.080499 sshd[4910]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:27.080000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:27.080000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:27.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.108:22-139.178.89.65:55918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:27.082410 systemd[1]: sshd@20-139.178.70.108:22-139.178.89.65:55918.service: Deactivated successfully. Feb 9 19:53:27.082914 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:53:27.083631 systemd-logind[1145]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:53:27.084208 systemd-logind[1145]: Removed session 23. Feb 9 19:53:31.265000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.270795 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:53:31.270867 kernel: audit: type=1400 audit(1707508411.265:1561): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.270913 kernel: audit: type=1300 audit(1707508411.265:1561): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002a7b9e0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.265000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002a7b9e0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.280983 kernel: audit: type=1327 audit(1707508411.265:1561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.280000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.285633 kernel: audit: type=1400 audit(1707508411.280:1562): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.290839 kernel: audit: type=1300 audit(1707508411.280:1562): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f52760 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.280000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f52760 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.280000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.280000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.298482 kernel: audit: type=1327 audit(1707508411.280:1562): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.298562 kernel: audit: type=1400 audit(1707508411.280:1563): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.280000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f52780 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.302971 kernel: audit: type=1300 audit(1707508411.280:1563): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f52780 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.303039 kernel: audit: type=1327 audit(1707508411.280:1563): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.280000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.280000 audit[2006]: AVC avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.280000 audit[2006]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f527a0 a2=fc6 a3=0 items=0 ppid=1863 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 key=(null) Feb 9 19:53:31.280000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.310898 kernel: audit: type=1400 audit(1707508411.280:1564): avc: denied { watch } for pid=2006 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c471,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:32.085173 systemd[1]: Started sshd@21-139.178.70.108:22-139.178.89.65:34398.service. Feb 9 19:53:32.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.108:22-139.178.89.65:34398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:32.138000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:32.139860 sshd[4923]: Accepted publickey for core from 139.178.89.65 port 34398 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:32.139000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:32.139000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe18aa4530 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:32.139000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:32.140997 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:32.143374 systemd-logind[1145]: New session 24 of user core. Feb 9 19:53:32.144019 systemd[1]: Started session-24.scope. Feb 9 19:53:32.146000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:32.146000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:32.279767 sshd[4923]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:32.279000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:32.279000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:32.281571 systemd-logind[1145]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:53:32.281660 systemd[1]: sshd@21-139.178.70.108:22-139.178.89.65:34398.service: Deactivated successfully. Feb 9 19:53:32.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.108:22-139.178.89.65:34398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:32.282175 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:53:32.282641 systemd-logind[1145]: Removed session 24. Feb 9 19:53:37.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.108:22-139.178.89.65:34404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:37.282925 systemd[1]: Started sshd@22-139.178.70.108:22-139.178.89.65:34404.service. Feb 9 19:53:37.284096 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:53:37.287258 kernel: audit: type=1130 audit(1707508417.282:1574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.108:22-139.178.89.65:34404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:37.330000 audit[4952]: USER_ACCT pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.331060 sshd[4952]: Accepted publickey for core from 139.178.89.65 port 34404 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:37.333000 audit[4952]: CRED_ACQ pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.335125 sshd[4952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:37.338050 kernel: audit: type=1101 audit(1707508417.330:1575): pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.338119 kernel: audit: type=1103 audit(1707508417.333:1576): pid=4952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.338150 kernel: audit: type=1006 audit(1707508417.333:1577): pid=4952 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 19:53:37.333000 audit[4952]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe50f83ae0 a2=3 a3=0 items=0 ppid=1 pid=4952 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:37.343587 kernel: audit: type=1300 audit(1707508417.333:1577): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe50f83ae0 a2=3 a3=0 items=0 ppid=1 pid=4952 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:37.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:37.344833 kernel: audit: type=1327 audit(1707508417.333:1577): proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:37.345933 systemd-logind[1145]: New session 25 of user core. Feb 9 19:53:37.346574 systemd[1]: Started session-25.scope. Feb 9 19:53:37.349000 audit[4952]: USER_START pid=4952 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.353000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.357660 kernel: audit: type=1105 audit(1707508417.349:1578): pid=4952 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.357707 kernel: audit: type=1103 audit(1707508417.353:1579): pid=4954 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.523392 sshd[4952]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:37.523000 audit[4952]: USER_END pid=4952 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.523000 audit[4952]: CRED_DISP pid=4952 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.531683 kernel: audit: type=1106 audit(1707508417.523:1580): pid=4952 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.531754 kernel: audit: type=1104 audit(1707508417.523:1581): pid=4952 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:37.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.108:22-139.178.89.65:34404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:37.533419 systemd[1]: sshd@22-139.178.70.108:22-139.178.89.65:34404.service: Deactivated successfully. Feb 9 19:53:37.534154 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:53:37.535845 systemd-logind[1145]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:53:37.536483 systemd-logind[1145]: Removed session 25. Feb 9 19:53:42.527560 systemd[1]: Started sshd@23-139.178.70.108:22-139.178.89.65:35142.service. Feb 9 19:53:42.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.108:22-139.178.89.65:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:42.532622 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:53:42.533429 kernel: audit: type=1130 audit(1707508422.526:1583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.108:22-139.178.89.65:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:42.732000 audit[5009]: USER_ACCT pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.734951 sshd[5009]: Accepted publickey for core from 139.178.89.65 port 35142 ssh2: RSA SHA256:rEL1S6qAXEJti+jLtGl56AgBuj4qp94axBvYkXmrlvQ Feb 9 19:53:42.736894 kernel: audit: type=1101 audit(1707508422.732:1584): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.736000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.746803 kernel: audit: type=1103 audit(1707508422.736:1585): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.746856 kernel: audit: type=1006 audit(1707508422.740:1586): pid=5009 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:53:42.746910 kernel: audit: type=1300 audit(1707508422.740:1586): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca0348ab0 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:42.746938 kernel: audit: type=1327 audit(1707508422.740:1586): proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:42.740000 audit[5009]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca0348ab0 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:42.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:53:42.756731 sshd[5009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:53:42.764328 systemd[1]: Started session-26.scope. Feb 9 19:53:42.766000 audit[5009]: USER_START pid=5009 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.767000 audit[5011]: CRED_ACQ pid=5011 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.764567 systemd-logind[1145]: New session 26 of user core. Feb 9 19:53:42.780262 kernel: audit: type=1105 audit(1707508422.766:1587): pid=5009 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.780320 kernel: audit: type=1103 audit(1707508422.767:1588): pid=5011 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.932800 sshd[5009]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:42.932000 audit[5009]: USER_END pid=5009 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.934656 systemd[1]: sshd@23-139.178.70.108:22-139.178.89.65:35142.service: Deactivated successfully. Feb 9 19:53:42.935164 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:53:42.937942 kernel: audit: type=1106 audit(1707508422.932:1589): pid=5009 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.932000 audit[5009]: CRED_DISP pid=5009 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.941848 systemd-logind[1145]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:53:42.941963 kernel: audit: type=1104 audit(1707508422.932:1590): pid=5009 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 19:53:42.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.108:22-139.178.89.65:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:42.942544 systemd-logind[1145]: Removed session 26.