Feb 12 21:50:16.667203 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 21:50:16.667232 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:50:16.667239 kernel: Disabled fast string operations Feb 12 21:50:16.667244 kernel: BIOS-provided physical RAM map: Feb 12 21:50:16.667247 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Feb 12 21:50:16.667251 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Feb 12 21:50:16.672337 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Feb 12 21:50:16.672348 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Feb 12 21:50:16.672357 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Feb 12 21:50:16.672362 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Feb 12 21:50:16.672366 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Feb 12 21:50:16.672370 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Feb 12 21:50:16.672374 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Feb 12 21:50:16.672378 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 12 21:50:16.672387 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Feb 12 21:50:16.672392 kernel: NX (Execute Disable) protection: active Feb 12 21:50:16.672402 kernel: SMBIOS 2.7 present. Feb 12 21:50:16.672407 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Feb 12 21:50:16.672411 kernel: vmware: hypercall mode: 0x00 Feb 12 21:50:16.672416 kernel: Hypervisor detected: VMware Feb 12 21:50:16.672422 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Feb 12 21:50:16.672426 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Feb 12 21:50:16.672431 kernel: vmware: using clock offset of 5364569346 ns Feb 12 21:50:16.672435 kernel: tsc: Detected 3408.000 MHz processor Feb 12 21:50:16.672446 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 21:50:16.672451 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 21:50:16.672456 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Feb 12 21:50:16.672461 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 21:50:16.672466 kernel: total RAM covered: 3072M Feb 12 21:50:16.672471 kernel: Found optimal setting for mtrr clean up Feb 12 21:50:16.672477 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Feb 12 21:50:16.672487 kernel: Using GB pages for direct mapping Feb 12 21:50:16.672492 kernel: ACPI: Early table checksum verification disabled Feb 12 21:50:16.672497 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Feb 12 21:50:16.672502 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Feb 12 21:50:16.672507 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Feb 12 21:50:16.672513 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Feb 12 21:50:16.672521 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 12 21:50:16.672527 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 12 21:50:16.672533 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Feb 12 21:50:16.672548 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Feb 12 21:50:16.672554 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Feb 12 21:50:16.672559 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Feb 12 21:50:16.672564 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Feb 12 21:50:16.672570 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Feb 12 21:50:16.672575 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Feb 12 21:50:16.672580 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Feb 12 21:50:16.672585 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 12 21:50:16.672590 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 12 21:50:16.672596 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Feb 12 21:50:16.672601 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Feb 12 21:50:16.672606 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Feb 12 21:50:16.672611 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Feb 12 21:50:16.672617 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Feb 12 21:50:16.672622 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Feb 12 21:50:16.672627 kernel: system APIC only can use physical flat Feb 12 21:50:16.672632 kernel: Setting APIC routing to physical flat. Feb 12 21:50:16.672643 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 21:50:16.672648 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Feb 12 21:50:16.672653 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Feb 12 21:50:16.672658 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Feb 12 21:50:16.672663 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Feb 12 21:50:16.672671 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Feb 12 21:50:16.672676 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Feb 12 21:50:16.672681 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Feb 12 21:50:16.672686 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Feb 12 21:50:16.672691 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Feb 12 21:50:16.672696 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Feb 12 21:50:16.672701 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Feb 12 21:50:16.672706 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Feb 12 21:50:16.672711 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Feb 12 21:50:16.672722 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Feb 12 21:50:16.672736 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Feb 12 21:50:16.672742 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Feb 12 21:50:16.672748 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Feb 12 21:50:16.672756 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Feb 12 21:50:16.672760 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Feb 12 21:50:16.672765 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Feb 12 21:50:16.672771 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Feb 12 21:50:16.672778 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Feb 12 21:50:16.672785 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Feb 12 21:50:16.672793 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Feb 12 21:50:16.672802 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Feb 12 21:50:16.672807 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Feb 12 21:50:16.672819 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Feb 12 21:50:16.672825 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Feb 12 21:50:16.672830 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Feb 12 21:50:16.672835 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Feb 12 21:50:16.672840 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Feb 12 21:50:16.672845 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Feb 12 21:50:16.672850 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Feb 12 21:50:16.672855 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Feb 12 21:50:16.672862 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Feb 12 21:50:16.672867 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Feb 12 21:50:16.672872 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Feb 12 21:50:16.672877 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Feb 12 21:50:16.672882 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Feb 12 21:50:16.672889 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Feb 12 21:50:16.672894 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Feb 12 21:50:16.672899 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Feb 12 21:50:16.672904 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Feb 12 21:50:16.672915 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Feb 12 21:50:16.672923 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Feb 12 21:50:16.672928 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Feb 12 21:50:16.672933 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Feb 12 21:50:16.672938 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Feb 12 21:50:16.672943 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Feb 12 21:50:16.672948 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Feb 12 21:50:16.672953 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Feb 12 21:50:16.672958 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Feb 12 21:50:16.672963 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Feb 12 21:50:16.672968 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Feb 12 21:50:16.672974 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Feb 12 21:50:16.672979 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Feb 12 21:50:16.672988 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Feb 12 21:50:16.672995 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Feb 12 21:50:16.673000 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Feb 12 21:50:16.673006 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Feb 12 21:50:16.673014 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Feb 12 21:50:16.673020 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Feb 12 21:50:16.673026 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Feb 12 21:50:16.673031 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Feb 12 21:50:16.673037 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Feb 12 21:50:16.673042 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Feb 12 21:50:16.673053 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Feb 12 21:50:16.673058 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Feb 12 21:50:16.673063 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Feb 12 21:50:16.673069 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Feb 12 21:50:16.673075 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Feb 12 21:50:16.673082 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Feb 12 21:50:16.673088 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Feb 12 21:50:16.673093 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Feb 12 21:50:16.673099 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Feb 12 21:50:16.673109 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Feb 12 21:50:16.673118 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Feb 12 21:50:16.673126 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Feb 12 21:50:16.673135 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Feb 12 21:50:16.673152 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Feb 12 21:50:16.673158 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Feb 12 21:50:16.673163 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Feb 12 21:50:16.673170 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Feb 12 21:50:16.673178 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Feb 12 21:50:16.673188 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Feb 12 21:50:16.673202 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Feb 12 21:50:16.673208 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Feb 12 21:50:16.673229 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Feb 12 21:50:16.673234 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Feb 12 21:50:16.673239 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Feb 12 21:50:16.673244 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Feb 12 21:50:16.673252 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Feb 12 21:50:16.673257 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Feb 12 21:50:16.673263 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Feb 12 21:50:16.673269 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Feb 12 21:50:16.673278 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Feb 12 21:50:16.673286 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Feb 12 21:50:16.673295 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Feb 12 21:50:16.673303 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Feb 12 21:50:16.673312 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Feb 12 21:50:16.673321 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Feb 12 21:50:16.673332 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Feb 12 21:50:16.673341 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Feb 12 21:50:16.673349 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Feb 12 21:50:16.673358 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Feb 12 21:50:16.673366 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Feb 12 21:50:16.673371 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Feb 12 21:50:16.673377 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Feb 12 21:50:16.673382 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Feb 12 21:50:16.673388 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Feb 12 21:50:16.673393 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Feb 12 21:50:16.673400 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Feb 12 21:50:16.673405 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Feb 12 21:50:16.673411 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Feb 12 21:50:16.673416 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Feb 12 21:50:16.673421 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Feb 12 21:50:16.673427 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Feb 12 21:50:16.673432 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Feb 12 21:50:16.673437 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Feb 12 21:50:16.673442 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Feb 12 21:50:16.673447 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Feb 12 21:50:16.673454 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Feb 12 21:50:16.673459 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Feb 12 21:50:16.673464 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Feb 12 21:50:16.673470 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Feb 12 21:50:16.673475 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Feb 12 21:50:16.673481 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Feb 12 21:50:16.673486 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 21:50:16.673491 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 21:50:16.673498 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Feb 12 21:50:16.673506 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Feb 12 21:50:16.673513 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Feb 12 21:50:16.673518 kernel: Zone ranges: Feb 12 21:50:16.673524 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 21:50:16.673529 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Feb 12 21:50:16.673535 kernel: Normal empty Feb 12 21:50:16.673540 kernel: Movable zone start for each node Feb 12 21:50:16.673545 kernel: Early memory node ranges Feb 12 21:50:16.673551 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Feb 12 21:50:16.673556 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Feb 12 21:50:16.673563 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Feb 12 21:50:16.673568 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Feb 12 21:50:16.673574 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 21:50:16.673579 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Feb 12 21:50:16.673585 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Feb 12 21:50:16.673590 kernel: ACPI: PM-Timer IO Port: 0x1008 Feb 12 21:50:16.673596 kernel: system APIC only can use physical flat Feb 12 21:50:16.673601 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Feb 12 21:50:16.673606 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 12 21:50:16.673613 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 12 21:50:16.673618 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 12 21:50:16.673623 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 12 21:50:16.673629 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 12 21:50:16.673634 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 12 21:50:16.673639 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 12 21:50:16.673645 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 12 21:50:16.673651 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 12 21:50:16.673658 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 12 21:50:16.673664 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 12 21:50:16.673673 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 12 21:50:16.673682 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 12 21:50:16.673691 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 12 21:50:16.673697 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 12 21:50:16.673703 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 12 21:50:16.673710 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Feb 12 21:50:16.673716 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Feb 12 21:50:16.673722 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Feb 12 21:50:16.673730 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Feb 12 21:50:16.673741 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Feb 12 21:50:16.673750 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Feb 12 21:50:16.673758 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Feb 12 21:50:16.673768 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Feb 12 21:50:16.673776 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Feb 12 21:50:16.673782 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Feb 12 21:50:16.673787 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Feb 12 21:50:16.673792 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Feb 12 21:50:16.673798 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Feb 12 21:50:16.673803 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Feb 12 21:50:16.673810 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Feb 12 21:50:16.673816 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Feb 12 21:50:16.673821 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Feb 12 21:50:16.673826 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Feb 12 21:50:16.673832 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Feb 12 21:50:16.673837 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Feb 12 21:50:16.673842 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Feb 12 21:50:16.673847 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Feb 12 21:50:16.673853 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Feb 12 21:50:16.673859 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Feb 12 21:50:16.673864 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Feb 12 21:50:16.673869 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Feb 12 21:50:16.673875 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Feb 12 21:50:16.673880 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Feb 12 21:50:16.673885 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Feb 12 21:50:16.673890 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Feb 12 21:50:16.673895 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Feb 12 21:50:16.673901 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Feb 12 21:50:16.673906 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Feb 12 21:50:16.673912 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Feb 12 21:50:16.673918 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Feb 12 21:50:16.673923 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Feb 12 21:50:16.673928 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Feb 12 21:50:16.673933 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Feb 12 21:50:16.673938 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Feb 12 21:50:16.673944 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Feb 12 21:50:16.673949 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Feb 12 21:50:16.673954 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Feb 12 21:50:16.673960 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Feb 12 21:50:16.673966 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Feb 12 21:50:16.673971 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Feb 12 21:50:16.673976 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Feb 12 21:50:16.673982 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Feb 12 21:50:16.673990 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Feb 12 21:50:16.673995 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Feb 12 21:50:16.674000 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Feb 12 21:50:16.674006 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Feb 12 21:50:16.674011 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Feb 12 21:50:16.674017 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Feb 12 21:50:16.674023 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Feb 12 21:50:16.674028 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Feb 12 21:50:16.674033 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Feb 12 21:50:16.674039 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Feb 12 21:50:16.674044 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Feb 12 21:50:16.674049 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Feb 12 21:50:16.674055 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Feb 12 21:50:16.674060 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Feb 12 21:50:16.674066 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Feb 12 21:50:16.674071 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Feb 12 21:50:16.674077 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Feb 12 21:50:16.674082 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Feb 12 21:50:16.674087 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Feb 12 21:50:16.674093 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Feb 12 21:50:16.674098 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Feb 12 21:50:16.674103 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Feb 12 21:50:16.674108 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Feb 12 21:50:16.674114 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Feb 12 21:50:16.674120 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Feb 12 21:50:16.674125 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Feb 12 21:50:16.674130 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Feb 12 21:50:16.674136 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Feb 12 21:50:16.674141 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Feb 12 21:50:16.674146 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Feb 12 21:50:16.674151 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Feb 12 21:50:16.674157 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Feb 12 21:50:16.674162 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Feb 12 21:50:16.674169 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Feb 12 21:50:16.674176 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Feb 12 21:50:16.674181 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Feb 12 21:50:16.674187 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Feb 12 21:50:16.674196 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Feb 12 21:50:16.674201 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Feb 12 21:50:16.674207 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Feb 12 21:50:16.674258 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Feb 12 21:50:16.674269 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Feb 12 21:50:16.674280 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Feb 12 21:50:16.674287 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Feb 12 21:50:16.674293 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Feb 12 21:50:16.674300 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Feb 12 21:50:16.674307 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Feb 12 21:50:16.674312 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Feb 12 21:50:16.674319 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Feb 12 21:50:16.674328 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Feb 12 21:50:16.674336 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Feb 12 21:50:16.674344 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Feb 12 21:50:16.674352 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Feb 12 21:50:16.674360 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Feb 12 21:50:16.674368 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Feb 12 21:50:16.674377 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Feb 12 21:50:16.674385 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Feb 12 21:50:16.674391 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Feb 12 21:50:16.674397 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Feb 12 21:50:16.674405 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Feb 12 21:50:16.674410 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Feb 12 21:50:16.674418 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Feb 12 21:50:16.674423 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Feb 12 21:50:16.674428 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Feb 12 21:50:16.674434 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Feb 12 21:50:16.674439 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Feb 12 21:50:16.674444 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 21:50:16.674450 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Feb 12 21:50:16.674455 kernel: TSC deadline timer available Feb 12 21:50:16.674460 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Feb 12 21:50:16.674467 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Feb 12 21:50:16.674475 kernel: Booting paravirtualized kernel on VMware hypervisor Feb 12 21:50:16.674481 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 21:50:16.674486 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Feb 12 21:50:16.674492 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 12 21:50:16.674497 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 12 21:50:16.674505 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Feb 12 21:50:16.674511 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Feb 12 21:50:16.674516 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Feb 12 21:50:16.674523 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Feb 12 21:50:16.674528 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Feb 12 21:50:16.674533 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Feb 12 21:50:16.674539 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Feb 12 21:50:16.674551 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Feb 12 21:50:16.674558 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Feb 12 21:50:16.674564 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Feb 12 21:50:16.674569 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Feb 12 21:50:16.674575 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Feb 12 21:50:16.674581 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Feb 12 21:50:16.674587 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Feb 12 21:50:16.674592 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Feb 12 21:50:16.674602 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Feb 12 21:50:16.674608 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Feb 12 21:50:16.674614 kernel: Policy zone: DMA32 Feb 12 21:50:16.674620 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:50:16.674626 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 21:50:16.674633 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Feb 12 21:50:16.674640 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Feb 12 21:50:16.674646 kernel: printk: log_buf_len min size: 262144 bytes Feb 12 21:50:16.674652 kernel: printk: log_buf_len: 1048576 bytes Feb 12 21:50:16.674658 kernel: printk: early log buf free: 239728(91%) Feb 12 21:50:16.674664 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 21:50:16.674670 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 21:50:16.674676 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 21:50:16.674682 kernel: Memory: 1942952K/2096628K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 153416K reserved, 0K cma-reserved) Feb 12 21:50:16.674691 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Feb 12 21:50:16.674700 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 21:50:16.674709 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 21:50:16.674718 kernel: rcu: Hierarchical RCU implementation. Feb 12 21:50:16.674727 kernel: rcu: RCU event tracing is enabled. Feb 12 21:50:16.674734 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Feb 12 21:50:16.674740 kernel: Rude variant of Tasks RCU enabled. Feb 12 21:50:16.674745 kernel: Tracing variant of Tasks RCU enabled. Feb 12 21:50:16.674751 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 21:50:16.674757 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Feb 12 21:50:16.674763 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Feb 12 21:50:16.674772 kernel: random: crng init done Feb 12 21:50:16.674778 kernel: Console: colour VGA+ 80x25 Feb 12 21:50:16.674784 kernel: printk: console [tty0] enabled Feb 12 21:50:16.674790 kernel: printk: console [ttyS0] enabled Feb 12 21:50:16.674797 kernel: ACPI: Core revision 20210730 Feb 12 21:50:16.674807 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Feb 12 21:50:16.674817 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 21:50:16.674826 kernel: x2apic enabled Feb 12 21:50:16.674833 kernel: Switched APIC routing to physical x2apic. Feb 12 21:50:16.674839 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 21:50:16.674845 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 12 21:50:16.674854 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Feb 12 21:50:16.674862 kernel: Disabled fast string operations Feb 12 21:50:16.674870 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 21:50:16.674875 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 21:50:16.674884 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 21:50:16.674891 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 12 21:50:16.674897 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 12 21:50:16.674903 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 21:50:16.674908 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 12 21:50:16.674914 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 12 21:50:16.674924 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 21:50:16.674930 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 21:50:16.674936 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 21:50:16.674942 kernel: SRBDS: Unknown: Dependent on hypervisor status Feb 12 21:50:16.674947 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 21:50:16.674953 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 21:50:16.674959 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 21:50:16.674965 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 21:50:16.674970 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 21:50:16.674977 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 12 21:50:16.674983 kernel: Freeing SMP alternatives memory: 32K Feb 12 21:50:16.674989 kernel: pid_max: default: 131072 minimum: 1024 Feb 12 21:50:16.674994 kernel: LSM: Security Framework initializing Feb 12 21:50:16.675000 kernel: SELinux: Initializing. Feb 12 21:50:16.675006 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 21:50:16.675012 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 21:50:16.675017 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 12 21:50:16.675023 kernel: Performance Events: Skylake events, core PMU driver. Feb 12 21:50:16.675032 kernel: core: CPUID marked event: 'cpu cycles' unavailable Feb 12 21:50:16.675038 kernel: core: CPUID marked event: 'instructions' unavailable Feb 12 21:50:16.675044 kernel: core: CPUID marked event: 'bus cycles' unavailable Feb 12 21:50:16.675050 kernel: core: CPUID marked event: 'cache references' unavailable Feb 12 21:50:16.675059 kernel: core: CPUID marked event: 'cache misses' unavailable Feb 12 21:50:16.675068 kernel: core: CPUID marked event: 'branch instructions' unavailable Feb 12 21:50:16.675074 kernel: core: CPUID marked event: 'branch misses' unavailable Feb 12 21:50:16.675079 kernel: ... version: 1 Feb 12 21:50:16.675085 kernel: ... bit width: 48 Feb 12 21:50:16.675093 kernel: ... generic registers: 4 Feb 12 21:50:16.675099 kernel: ... value mask: 0000ffffffffffff Feb 12 21:50:16.675105 kernel: ... max period: 000000007fffffff Feb 12 21:50:16.675110 kernel: ... fixed-purpose events: 0 Feb 12 21:50:16.675117 kernel: ... event mask: 000000000000000f Feb 12 21:50:16.675125 kernel: signal: max sigframe size: 1776 Feb 12 21:50:16.675131 kernel: rcu: Hierarchical SRCU implementation. Feb 12 21:50:16.675139 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 21:50:16.675146 kernel: smp: Bringing up secondary CPUs ... Feb 12 21:50:16.675153 kernel: x86: Booting SMP configuration: Feb 12 21:50:16.675160 kernel: .... node #0, CPUs: #1 Feb 12 21:50:16.675170 kernel: Disabled fast string operations Feb 12 21:50:16.675178 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Feb 12 21:50:16.675186 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Feb 12 21:50:16.675192 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 21:50:16.675198 kernel: smpboot: Max logical packages: 128 Feb 12 21:50:16.675204 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Feb 12 21:50:16.675221 kernel: devtmpfs: initialized Feb 12 21:50:16.675227 kernel: x86/mm: Memory block size: 128MB Feb 12 21:50:16.675235 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Feb 12 21:50:16.675241 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 21:50:16.675250 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Feb 12 21:50:16.675256 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 21:50:16.675264 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 21:50:16.675271 kernel: audit: initializing netlink subsys (disabled) Feb 12 21:50:16.675279 kernel: audit: type=2000 audit(1707774615.058:1): state=initialized audit_enabled=0 res=1 Feb 12 21:50:16.675285 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 21:50:16.675290 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 21:50:16.675297 kernel: cpuidle: using governor menu Feb 12 21:50:16.675303 kernel: Simple Boot Flag at 0x36 set to 0x80 Feb 12 21:50:16.675309 kernel: ACPI: bus type PCI registered Feb 12 21:50:16.675314 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 21:50:16.675323 kernel: dca service started, version 1.12.1 Feb 12 21:50:16.675332 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Feb 12 21:50:16.675342 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Feb 12 21:50:16.675348 kernel: PCI: Using configuration type 1 for base access Feb 12 21:50:16.675353 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 21:50:16.675360 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 21:50:16.675366 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 21:50:16.675372 kernel: ACPI: Added _OSI(Module Device) Feb 12 21:50:16.675378 kernel: ACPI: Added _OSI(Processor Device) Feb 12 21:50:16.675384 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 21:50:16.675389 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 21:50:16.675395 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 21:50:16.675400 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 21:50:16.675406 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 21:50:16.675414 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 21:50:16.675422 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 12 21:50:16.675427 kernel: ACPI: Interpreter enabled Feb 12 21:50:16.675433 kernel: ACPI: PM: (supports S0 S1 S5) Feb 12 21:50:16.675439 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 21:50:16.675445 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 21:50:16.675451 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Feb 12 21:50:16.675458 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Feb 12 21:50:16.675572 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 21:50:16.675643 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Feb 12 21:50:16.675696 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Feb 12 21:50:16.675704 kernel: PCI host bridge to bus 0000:00 Feb 12 21:50:16.675768 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 21:50:16.675827 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Feb 12 21:50:16.675878 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Feb 12 21:50:16.675932 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Feb 12 21:50:16.675985 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Feb 12 21:50:16.676039 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 12 21:50:16.676093 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 21:50:16.676141 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Feb 12 21:50:16.676191 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Feb 12 21:50:16.676276 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Feb 12 21:50:16.676344 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Feb 12 21:50:16.676409 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Feb 12 21:50:16.676483 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Feb 12 21:50:16.676539 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Feb 12 21:50:16.676597 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 21:50:16.676666 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 21:50:16.676717 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 21:50:16.676774 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 21:50:16.676841 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Feb 12 21:50:16.676906 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Feb 12 21:50:16.676968 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Feb 12 21:50:16.677023 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Feb 12 21:50:16.677075 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Feb 12 21:50:16.677130 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Feb 12 21:50:16.677181 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Feb 12 21:50:16.677235 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Feb 12 21:50:16.677294 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Feb 12 21:50:16.677351 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Feb 12 21:50:16.677415 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Feb 12 21:50:16.677474 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 21:50:16.677524 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Feb 12 21:50:16.677578 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.677643 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.677727 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.677785 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.677841 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.677892 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.677951 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678005 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678071 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678130 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678190 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678265 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678321 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678373 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678425 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678471 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678529 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678585 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678647 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678705 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678762 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678824 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.678888 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.678952 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679011 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679068 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679144 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679218 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679291 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679362 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679433 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679520 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679606 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679699 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679776 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679853 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.679919 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.679977 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.680036 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.680104 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.680163 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691270 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.691359 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691412 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.691465 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691513 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.691564 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691639 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.691696 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691752 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.691803 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691849 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.691899 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.691965 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.692020 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.692067 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.692118 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.692179 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.692262 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.692319 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.692377 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.692437 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.692492 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Feb 12 21:50:16.692537 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.692588 kernel: pci_bus 0000:01: extended config space not accessible Feb 12 21:50:16.692636 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 21:50:16.692701 kernel: pci_bus 0000:02: extended config space not accessible Feb 12 21:50:16.692711 kernel: acpiphp: Slot [32] registered Feb 12 21:50:16.692717 kernel: acpiphp: Slot [33] registered Feb 12 21:50:16.692723 kernel: acpiphp: Slot [34] registered Feb 12 21:50:16.692729 kernel: acpiphp: Slot [35] registered Feb 12 21:50:16.692735 kernel: acpiphp: Slot [36] registered Feb 12 21:50:16.692740 kernel: acpiphp: Slot [37] registered Feb 12 21:50:16.692746 kernel: acpiphp: Slot [38] registered Feb 12 21:50:16.692752 kernel: acpiphp: Slot [39] registered Feb 12 21:50:16.692759 kernel: acpiphp: Slot [40] registered Feb 12 21:50:16.692765 kernel: acpiphp: Slot [41] registered Feb 12 21:50:16.692770 kernel: acpiphp: Slot [42] registered Feb 12 21:50:16.692776 kernel: acpiphp: Slot [43] registered Feb 12 21:50:16.692782 kernel: acpiphp: Slot [44] registered Feb 12 21:50:16.692788 kernel: acpiphp: Slot [45] registered Feb 12 21:50:16.692793 kernel: acpiphp: Slot [46] registered Feb 12 21:50:16.692799 kernel: acpiphp: Slot [47] registered Feb 12 21:50:16.692805 kernel: acpiphp: Slot [48] registered Feb 12 21:50:16.692812 kernel: acpiphp: Slot [49] registered Feb 12 21:50:16.692818 kernel: acpiphp: Slot [50] registered Feb 12 21:50:16.692823 kernel: acpiphp: Slot [51] registered Feb 12 21:50:16.692829 kernel: acpiphp: Slot [52] registered Feb 12 21:50:16.692837 kernel: acpiphp: Slot [53] registered Feb 12 21:50:16.692843 kernel: acpiphp: Slot [54] registered Feb 12 21:50:16.692849 kernel: acpiphp: Slot [55] registered Feb 12 21:50:16.692856 kernel: acpiphp: Slot [56] registered Feb 12 21:50:16.692866 kernel: acpiphp: Slot [57] registered Feb 12 21:50:16.692872 kernel: acpiphp: Slot [58] registered Feb 12 21:50:16.692879 kernel: acpiphp: Slot [59] registered Feb 12 21:50:16.692885 kernel: acpiphp: Slot [60] registered Feb 12 21:50:16.692891 kernel: acpiphp: Slot [61] registered Feb 12 21:50:16.692896 kernel: acpiphp: Slot [62] registered Feb 12 21:50:16.692902 kernel: acpiphp: Slot [63] registered Feb 12 21:50:16.692953 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Feb 12 21:50:16.693000 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 12 21:50:16.693046 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 12 21:50:16.693092 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 21:50:16.693137 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Feb 12 21:50:16.693183 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Feb 12 21:50:16.696922 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Feb 12 21:50:16.697008 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Feb 12 21:50:16.697074 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Feb 12 21:50:16.697126 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Feb 12 21:50:16.697172 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Feb 12 21:50:16.697240 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Feb 12 21:50:16.697296 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Feb 12 21:50:16.697344 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Feb 12 21:50:16.697392 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Feb 12 21:50:16.697440 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 12 21:50:16.697486 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 12 21:50:16.697532 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 12 21:50:16.697588 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 12 21:50:16.697640 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 12 21:50:16.697685 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 12 21:50:16.697732 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 12 21:50:16.697777 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 12 21:50:16.697822 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 12 21:50:16.697867 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 21:50:16.697934 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 12 21:50:16.697986 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 12 21:50:16.698041 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 12 21:50:16.698088 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 21:50:16.698145 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 12 21:50:16.698220 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 12 21:50:16.698274 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 21:50:16.698338 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 12 21:50:16.698390 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 12 21:50:16.698445 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 21:50:16.698500 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 12 21:50:16.698546 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 12 21:50:16.698606 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 21:50:16.698662 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 12 21:50:16.698726 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 12 21:50:16.698773 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 21:50:16.698821 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 12 21:50:16.698871 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 12 21:50:16.698935 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 21:50:16.698991 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Feb 12 21:50:16.699054 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Feb 12 21:50:16.699113 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Feb 12 21:50:16.699162 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Feb 12 21:50:16.699219 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Feb 12 21:50:16.699280 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 12 21:50:16.699337 kernel: pci 0000:0b:00.0: supports D1 D2 Feb 12 21:50:16.699404 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 21:50:16.699459 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 12 21:50:16.699509 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 12 21:50:16.699556 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 12 21:50:16.699601 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 12 21:50:16.699649 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 12 21:50:16.699694 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 12 21:50:16.699749 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 12 21:50:16.707760 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 21:50:16.707852 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 12 21:50:16.707912 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 12 21:50:16.707968 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 12 21:50:16.708029 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 21:50:16.708101 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 12 21:50:16.708178 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 12 21:50:16.708247 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 21:50:16.708296 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 12 21:50:16.708348 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 12 21:50:16.708421 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 21:50:16.708483 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 12 21:50:16.708550 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 12 21:50:16.708627 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 21:50:16.708680 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 12 21:50:16.708726 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 12 21:50:16.708771 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 21:50:16.708823 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 12 21:50:16.708877 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 12 21:50:16.708922 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 21:50:16.708975 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 12 21:50:16.709027 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 12 21:50:16.709074 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 12 21:50:16.709129 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 21:50:16.709194 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 12 21:50:16.709264 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 12 21:50:16.709320 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 12 21:50:16.709365 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 21:50:16.709412 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 12 21:50:16.709476 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 12 21:50:16.709522 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 12 21:50:16.709568 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 21:50:16.709618 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 12 21:50:16.709664 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 12 21:50:16.709708 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 21:50:16.709760 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 12 21:50:16.709819 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 12 21:50:16.709871 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 21:50:16.709934 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 12 21:50:16.709998 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 12 21:50:16.710059 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 21:50:16.710116 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 12 21:50:16.710164 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 12 21:50:16.710208 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 21:50:16.711376 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 12 21:50:16.711429 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 12 21:50:16.711481 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 21:50:16.711530 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 12 21:50:16.711576 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 12 21:50:16.711630 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 12 21:50:16.711675 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 21:50:16.711731 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 12 21:50:16.711800 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 12 21:50:16.711858 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 12 21:50:16.711904 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 21:50:16.711956 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 12 21:50:16.712014 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 12 21:50:16.712061 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 21:50:16.712110 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 12 21:50:16.712168 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 12 21:50:16.712221 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 21:50:16.712268 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 12 21:50:16.712313 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 12 21:50:16.712357 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 21:50:16.712406 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 12 21:50:16.712452 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 12 21:50:16.712497 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 21:50:16.712543 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 12 21:50:16.712598 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 12 21:50:16.712649 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 21:50:16.712702 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 12 21:50:16.712762 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 12 21:50:16.712816 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 21:50:16.712824 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Feb 12 21:50:16.712830 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Feb 12 21:50:16.712836 kernel: ACPI: PCI: Interrupt link LNKB disabled Feb 12 21:50:16.712842 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 21:50:16.712848 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Feb 12 21:50:16.712854 kernel: iommu: Default domain type: Translated Feb 12 21:50:16.712859 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 21:50:16.712916 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Feb 12 21:50:16.712964 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 21:50:16.713013 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Feb 12 21:50:16.713022 kernel: vgaarb: loaded Feb 12 21:50:16.713028 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 21:50:16.713036 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 21:50:16.713045 kernel: PTP clock support registered Feb 12 21:50:16.713051 kernel: PCI: Using ACPI for IRQ routing Feb 12 21:50:16.713057 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 21:50:16.713063 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Feb 12 21:50:16.713071 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Feb 12 21:50:16.713077 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Feb 12 21:50:16.713082 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Feb 12 21:50:16.713088 kernel: clocksource: Switched to clocksource tsc-early Feb 12 21:50:16.713094 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 21:50:16.713100 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 21:50:16.713106 kernel: pnp: PnP ACPI init Feb 12 21:50:16.713158 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Feb 12 21:50:16.713203 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Feb 12 21:50:16.718330 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Feb 12 21:50:16.718395 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Feb 12 21:50:16.718446 kernel: pnp 00:06: [dma 2] Feb 12 21:50:16.718492 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Feb 12 21:50:16.718533 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Feb 12 21:50:16.718573 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Feb 12 21:50:16.718584 kernel: pnp: PnP ACPI: found 8 devices Feb 12 21:50:16.718591 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 21:50:16.718603 kernel: NET: Registered PF_INET protocol family Feb 12 21:50:16.718613 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 21:50:16.718619 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 21:50:16.718626 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 21:50:16.718634 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 21:50:16.718640 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 21:50:16.718648 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 21:50:16.718654 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 21:50:16.718659 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 21:50:16.718666 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 21:50:16.718671 kernel: NET: Registered PF_XDP protocol family Feb 12 21:50:16.718726 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Feb 12 21:50:16.718776 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Feb 12 21:50:16.718826 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Feb 12 21:50:16.718876 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Feb 12 21:50:16.718929 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Feb 12 21:50:16.718992 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Feb 12 21:50:16.719043 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Feb 12 21:50:16.719101 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Feb 12 21:50:16.719149 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Feb 12 21:50:16.719197 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Feb 12 21:50:16.719259 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Feb 12 21:50:16.719307 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Feb 12 21:50:16.719354 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Feb 12 21:50:16.719400 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Feb 12 21:50:16.719446 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Feb 12 21:50:16.719494 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Feb 12 21:50:16.719554 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Feb 12 21:50:16.719604 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Feb 12 21:50:16.719662 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Feb 12 21:50:16.719713 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Feb 12 21:50:16.719764 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Feb 12 21:50:16.719818 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Feb 12 21:50:16.719877 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Feb 12 21:50:16.719930 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 21:50:16.719982 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 21:50:16.720028 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720073 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720121 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720168 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720237 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720290 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720336 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720385 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720437 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720487 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720546 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720597 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720645 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720689 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720735 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720780 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720825 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720875 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.720935 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.720981 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721027 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721081 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721127 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721173 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721231 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721282 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721329 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721376 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721421 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721467 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721520 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721568 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721626 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721682 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721730 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721776 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721831 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721878 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.721924 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.721969 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722014 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722059 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722106 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722150 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722195 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722253 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722306 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722353 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722408 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722457 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722503 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722556 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722610 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722655 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722700 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722748 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722794 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722840 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722885 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.722930 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.722975 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723026 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723081 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723126 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723172 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723233 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723279 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723324 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723368 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723413 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723457 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723505 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723549 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723594 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723637 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723682 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723731 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723776 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723821 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723866 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.723913 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.723961 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.724013 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 12 21:50:16.724059 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 12 21:50:16.724115 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 21:50:16.724167 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Feb 12 21:50:16.724219 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 12 21:50:16.724277 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 12 21:50:16.724327 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 21:50:16.724380 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Feb 12 21:50:16.724425 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 12 21:50:16.724471 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 12 21:50:16.724516 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 12 21:50:16.724568 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 21:50:16.724624 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 12 21:50:16.724672 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 12 21:50:16.724718 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 12 21:50:16.724764 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 21:50:16.724813 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 12 21:50:16.724868 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 12 21:50:16.724916 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 12 21:50:16.724963 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 21:50:16.725020 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 12 21:50:16.725067 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 12 21:50:16.725112 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 21:50:16.725172 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 12 21:50:16.732723 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 12 21:50:16.732790 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 21:50:16.732842 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 12 21:50:16.732890 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 12 21:50:16.732937 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 21:50:16.732983 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 12 21:50:16.733029 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 12 21:50:16.733078 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 21:50:16.733124 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 12 21:50:16.733168 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 12 21:50:16.733219 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 21:50:16.733270 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Feb 12 21:50:16.733317 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 12 21:50:16.733362 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 12 21:50:16.733418 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 12 21:50:16.733464 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 21:50:16.733513 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 12 21:50:16.733559 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 12 21:50:16.733605 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 12 21:50:16.733650 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 21:50:16.733695 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 12 21:50:16.733740 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 12 21:50:16.733784 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 12 21:50:16.733828 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 21:50:16.733872 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 12 21:50:16.733917 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 12 21:50:16.733965 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 21:50:16.734009 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 12 21:50:16.734053 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 12 21:50:16.734098 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 21:50:16.734143 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 12 21:50:16.734187 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 12 21:50:16.734239 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 21:50:16.734295 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 12 21:50:16.734341 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 12 21:50:16.734387 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 21:50:16.734432 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 12 21:50:16.734477 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 12 21:50:16.734522 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 21:50:16.734568 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 12 21:50:16.734618 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 12 21:50:16.734663 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 12 21:50:16.734708 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 21:50:16.734753 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 12 21:50:16.734798 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 12 21:50:16.734845 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 12 21:50:16.734890 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 21:50:16.734936 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 12 21:50:16.734981 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 12 21:50:16.735025 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 12 21:50:16.735071 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 21:50:16.735117 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 12 21:50:16.735171 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 12 21:50:16.735226 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 21:50:16.735279 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 12 21:50:16.735325 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 12 21:50:16.735371 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 21:50:16.735416 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 12 21:50:16.735461 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 12 21:50:16.735504 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 21:50:16.735549 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 12 21:50:16.735617 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 12 21:50:16.735668 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 21:50:16.735722 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 12 21:50:16.735770 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 12 21:50:16.735814 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 21:50:16.735861 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 12 21:50:16.735905 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 12 21:50:16.735950 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 12 21:50:16.735994 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 21:50:16.736042 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 12 21:50:16.736087 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 12 21:50:16.736132 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 12 21:50:16.736178 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 21:50:16.736231 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 12 21:50:16.736276 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 12 21:50:16.736321 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 21:50:16.736376 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 12 21:50:16.736421 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 12 21:50:16.736466 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 21:50:16.736512 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 12 21:50:16.736557 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 12 21:50:16.736605 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 21:50:16.736650 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 12 21:50:16.736694 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 12 21:50:16.736741 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 21:50:16.736788 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 12 21:50:16.736833 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 12 21:50:16.736877 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 21:50:16.736923 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 12 21:50:16.736968 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 12 21:50:16.737020 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 21:50:16.737072 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Feb 12 21:50:16.737114 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Feb 12 21:50:16.737153 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 12 21:50:16.737204 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 12 21:50:16.737256 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 12 21:50:16.737296 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 12 21:50:16.737336 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Feb 12 21:50:16.737378 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Feb 12 21:50:16.737423 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Feb 12 21:50:16.737464 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Feb 12 21:50:16.737505 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 21:50:16.737546 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Feb 12 21:50:16.737586 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Feb 12 21:50:16.737628 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 12 21:50:16.737682 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 12 21:50:16.737724 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 12 21:50:16.737765 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 12 21:50:16.737806 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Feb 12 21:50:16.737847 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Feb 12 21:50:16.737894 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Feb 12 21:50:16.737936 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Feb 12 21:50:16.737977 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 21:50:16.738025 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Feb 12 21:50:16.738115 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Feb 12 21:50:16.738161 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 21:50:16.739285 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Feb 12 21:50:16.739336 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Feb 12 21:50:16.739381 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 21:50:16.739435 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Feb 12 21:50:16.739479 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 21:50:16.739526 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Feb 12 21:50:16.739567 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 21:50:16.739615 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Feb 12 21:50:16.739665 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 21:50:16.739715 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Feb 12 21:50:16.739757 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 21:50:16.739803 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Feb 12 21:50:16.739856 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 21:50:16.739902 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Feb 12 21:50:16.739949 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Feb 12 21:50:16.740024 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 21:50:16.740073 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Feb 12 21:50:16.740117 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Feb 12 21:50:16.740158 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 21:50:16.740204 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Feb 12 21:50:16.740349 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Feb 12 21:50:16.740390 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 21:50:16.740437 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Feb 12 21:50:16.740479 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 21:50:16.740533 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Feb 12 21:50:16.740575 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 21:50:16.740620 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Feb 12 21:50:16.740662 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 21:50:16.740711 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Feb 12 21:50:16.740752 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 21:50:16.740809 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Feb 12 21:50:16.740852 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 21:50:16.740900 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Feb 12 21:50:16.740941 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Feb 12 21:50:16.740982 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 21:50:16.741030 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Feb 12 21:50:16.741071 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Feb 12 21:50:16.741121 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 21:50:16.741168 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Feb 12 21:50:16.741216 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Feb 12 21:50:16.741265 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 21:50:16.741310 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Feb 12 21:50:16.741356 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 21:50:16.741400 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Feb 12 21:50:16.742284 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 21:50:16.742339 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Feb 12 21:50:16.742384 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 21:50:16.742442 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Feb 12 21:50:16.742490 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 21:50:16.742545 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Feb 12 21:50:16.742589 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 21:50:16.742635 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Feb 12 21:50:16.742677 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Feb 12 21:50:16.742721 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 21:50:16.742767 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Feb 12 21:50:16.742809 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Feb 12 21:50:16.742850 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 21:50:16.742895 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Feb 12 21:50:16.742937 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 21:50:16.742982 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Feb 12 21:50:16.743025 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 21:50:16.743081 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Feb 12 21:50:16.743125 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 21:50:16.743170 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Feb 12 21:50:16.744256 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 21:50:16.744329 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Feb 12 21:50:16.746397 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 21:50:16.746464 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Feb 12 21:50:16.746510 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 21:50:16.746563 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 21:50:16.746573 kernel: PCI: CLS 32 bytes, default 64 Feb 12 21:50:16.746579 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 21:50:16.746586 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 12 21:50:16.746595 kernel: clocksource: Switched to clocksource tsc Feb 12 21:50:16.746601 kernel: Initialise system trusted keyrings Feb 12 21:50:16.746608 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 21:50:16.746614 kernel: Key type asymmetric registered Feb 12 21:50:16.746620 kernel: Asymmetric key parser 'x509' registered Feb 12 21:50:16.746626 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 21:50:16.746632 kernel: io scheduler mq-deadline registered Feb 12 21:50:16.746638 kernel: io scheduler kyber registered Feb 12 21:50:16.746647 kernel: io scheduler bfq registered Feb 12 21:50:16.746708 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Feb 12 21:50:16.746757 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.746806 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Feb 12 21:50:16.746852 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.746899 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Feb 12 21:50:16.746946 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.746993 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Feb 12 21:50:16.747041 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747088 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Feb 12 21:50:16.747143 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747189 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Feb 12 21:50:16.747264 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747313 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Feb 12 21:50:16.747363 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747410 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Feb 12 21:50:16.747460 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747508 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Feb 12 21:50:16.747553 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747600 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Feb 12 21:50:16.747649 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747707 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Feb 12 21:50:16.747754 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747812 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Feb 12 21:50:16.747859 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747906 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Feb 12 21:50:16.747953 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.747999 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Feb 12 21:50:16.748044 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.748090 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Feb 12 21:50:16.748135 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.748184 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Feb 12 21:50:16.748243 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.748292 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Feb 12 21:50:16.748338 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.748383 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Feb 12 21:50:16.748451 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.748507 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Feb 12 21:50:16.748556 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.748613 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Feb 12 21:50:16.748666 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754320 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Feb 12 21:50:16.754380 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754431 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Feb 12 21:50:16.754483 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754556 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Feb 12 21:50:16.754604 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754651 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Feb 12 21:50:16.754696 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754745 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Feb 12 21:50:16.754789 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754836 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Feb 12 21:50:16.754881 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.754928 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Feb 12 21:50:16.754973 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.755022 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Feb 12 21:50:16.755068 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.755114 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Feb 12 21:50:16.755159 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.755206 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Feb 12 21:50:16.755276 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.755326 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Feb 12 21:50:16.755372 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.755418 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Feb 12 21:50:16.755464 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 21:50:16.755473 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 21:50:16.755482 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 21:50:16.755488 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 21:50:16.755494 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Feb 12 21:50:16.755501 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 21:50:16.755507 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 21:50:16.755555 kernel: rtc_cmos 00:01: registered as rtc0 Feb 12 21:50:16.755598 kernel: rtc_cmos 00:01: setting system clock to 2024-02-12T21:50:16 UTC (1707774616) Feb 12 21:50:16.755640 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Feb 12 21:50:16.755650 kernel: fail to initialize ptp_kvm Feb 12 21:50:16.755656 kernel: intel_pstate: CPU model not supported Feb 12 21:50:16.755663 kernel: NET: Registered PF_INET6 protocol family Feb 12 21:50:16.755669 kernel: Segment Routing with IPv6 Feb 12 21:50:16.755675 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 21:50:16.755682 kernel: NET: Registered PF_PACKET protocol family Feb 12 21:50:16.755688 kernel: Key type dns_resolver registered Feb 12 21:50:16.755694 kernel: IPI shorthand broadcast: enabled Feb 12 21:50:16.755701 kernel: sched_clock: Marking stable (872385871, 232943294)->(1183053711, -77724546) Feb 12 21:50:16.755708 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 21:50:16.755716 kernel: registered taskstats version 1 Feb 12 21:50:16.755722 kernel: Loading compiled-in X.509 certificates Feb 12 21:50:16.755728 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 21:50:16.755734 kernel: Key type .fscrypt registered Feb 12 21:50:16.755740 kernel: Key type fscrypt-provisioning registered Feb 12 21:50:16.755746 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 21:50:16.755753 kernel: ima: Allocated hash algorithm: sha1 Feb 12 21:50:16.755760 kernel: ima: No architecture policies found Feb 12 21:50:16.755766 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 21:50:16.755773 kernel: Write protecting the kernel read-only data: 28672k Feb 12 21:50:16.755779 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 21:50:16.755785 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 21:50:16.755792 kernel: Run /init as init process Feb 12 21:50:16.755798 kernel: with arguments: Feb 12 21:50:16.755804 kernel: /init Feb 12 21:50:16.755811 kernel: with environment: Feb 12 21:50:16.755816 kernel: HOME=/ Feb 12 21:50:16.755823 kernel: TERM=linux Feb 12 21:50:16.755829 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 21:50:16.755837 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 21:50:16.755845 systemd[1]: Detected virtualization vmware. Feb 12 21:50:16.755851 systemd[1]: Detected architecture x86-64. Feb 12 21:50:16.755858 systemd[1]: Running in initrd. Feb 12 21:50:16.755864 systemd[1]: No hostname configured, using default hostname. Feb 12 21:50:16.755871 systemd[1]: Hostname set to . Feb 12 21:50:16.755878 systemd[1]: Initializing machine ID from random generator. Feb 12 21:50:16.755884 systemd[1]: Queued start job for default target initrd.target. Feb 12 21:50:16.755891 systemd[1]: Started systemd-ask-password-console.path. Feb 12 21:50:16.755897 systemd[1]: Reached target cryptsetup.target. Feb 12 21:50:16.755903 systemd[1]: Reached target paths.target. Feb 12 21:50:16.755909 systemd[1]: Reached target slices.target. Feb 12 21:50:16.755916 systemd[1]: Reached target swap.target. Feb 12 21:50:16.755922 systemd[1]: Reached target timers.target. Feb 12 21:50:16.755930 systemd[1]: Listening on iscsid.socket. Feb 12 21:50:16.755936 systemd[1]: Listening on iscsiuio.socket. Feb 12 21:50:16.755943 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 21:50:16.755950 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 21:50:16.755956 systemd[1]: Listening on systemd-journald.socket. Feb 12 21:50:16.755963 systemd[1]: Listening on systemd-networkd.socket. Feb 12 21:50:16.755969 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 21:50:16.755977 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 21:50:16.755983 systemd[1]: Reached target sockets.target. Feb 12 21:50:16.755989 systemd[1]: Starting kmod-static-nodes.service... Feb 12 21:50:16.755996 systemd[1]: Finished network-cleanup.service. Feb 12 21:50:16.756002 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 21:50:16.756009 systemd[1]: Starting systemd-journald.service... Feb 12 21:50:16.756015 systemd[1]: Starting systemd-modules-load.service... Feb 12 21:50:16.756021 systemd[1]: Starting systemd-resolved.service... Feb 12 21:50:16.756028 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 21:50:16.756035 systemd[1]: Finished kmod-static-nodes.service. Feb 12 21:50:16.756042 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 21:50:16.756048 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 21:50:16.756055 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 21:50:16.756061 kernel: audit: type=1130 audit(1707774616.662:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.756068 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 21:50:16.756074 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 21:50:16.756081 kernel: audit: type=1130 audit(1707774616.667:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.756087 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 21:50:16.756094 systemd[1]: Starting dracut-cmdline.service... Feb 12 21:50:16.756101 kernel: audit: type=1130 audit(1707774616.682:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.756107 systemd[1]: Started systemd-resolved.service. Feb 12 21:50:16.756114 systemd[1]: Reached target nss-lookup.target. Feb 12 21:50:16.756121 kernel: audit: type=1130 audit(1707774616.700:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.756128 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 21:50:16.756134 kernel: Bridge firewalling registered Feb 12 21:50:16.756140 kernel: SCSI subsystem initialized Feb 12 21:50:16.756146 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 21:50:16.756152 kernel: device-mapper: uevent: version 1.0.3 Feb 12 21:50:16.756159 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 21:50:16.756165 systemd[1]: Finished systemd-modules-load.service. Feb 12 21:50:16.756172 kernel: audit: type=1130 audit(1707774616.747:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.756178 kernel: Loading iSCSI transport class v2.0-870. Feb 12 21:50:16.756185 systemd[1]: Starting systemd-sysctl.service... Feb 12 21:50:16.756194 systemd-journald[217]: Journal started Feb 12 21:50:16.756237 systemd-journald[217]: Runtime Journal (/run/log/journal/209e356dbf444e6ead329b0fde99d328) is 4.8M, max 38.8M, 34.0M free. Feb 12 21:50:16.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.657122 systemd-modules-load[218]: Inserted module 'overlay' Feb 12 21:50:16.695485 systemd-resolved[219]: Positive Trust Anchors: Feb 12 21:50:16.758984 systemd[1]: Started systemd-journald.service. Feb 12 21:50:16.695491 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 21:50:16.695511 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 21:50:16.699869 systemd-resolved[219]: Defaulting to hostname 'linux'. Feb 12 21:50:16.714161 systemd-modules-load[218]: Inserted module 'br_netfilter' Feb 12 21:50:16.766688 kernel: audit: type=1130 audit(1707774616.760:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.766700 kernel: audit: type=1130 audit(1707774616.760:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.747269 systemd-modules-load[218]: Inserted module 'dm_multipath' Feb 12 21:50:16.767426 dracut-cmdline[233]: dracut-dracut-053 Feb 12 21:50:16.767426 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 12 21:50:16.767426 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:50:16.761763 systemd[1]: Finished systemd-sysctl.service. Feb 12 21:50:16.768270 kernel: iscsi: registered transport (tcp) Feb 12 21:50:16.781447 kernel: iscsi: registered transport (qla4xxx) Feb 12 21:50:16.781473 kernel: QLogic iSCSI HBA Driver Feb 12 21:50:16.798089 systemd[1]: Finished dracut-cmdline.service. Feb 12 21:50:16.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.798726 systemd[1]: Starting dracut-pre-udev.service... Feb 12 21:50:16.801329 kernel: audit: type=1130 audit(1707774616.797:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:16.836230 kernel: raid6: avx2x4 gen() 47109 MB/s Feb 12 21:50:16.853225 kernel: raid6: avx2x4 xor() 20936 MB/s Feb 12 21:50:16.870227 kernel: raid6: avx2x2 gen() 52168 MB/s Feb 12 21:50:16.887253 kernel: raid6: avx2x2 xor() 31689 MB/s Feb 12 21:50:16.904225 kernel: raid6: avx2x1 gen() 43375 MB/s Feb 12 21:50:16.921225 kernel: raid6: avx2x1 xor() 27413 MB/s Feb 12 21:50:16.938259 kernel: raid6: sse2x4 gen() 21121 MB/s Feb 12 21:50:16.955225 kernel: raid6: sse2x4 xor() 11750 MB/s Feb 12 21:50:16.974254 kernel: raid6: sse2x2 gen() 21418 MB/s Feb 12 21:50:16.991252 kernel: raid6: sse2x2 xor() 13228 MB/s Feb 12 21:50:17.008227 kernel: raid6: sse2x1 gen() 17471 MB/s Feb 12 21:50:17.025522 kernel: raid6: sse2x1 xor() 8643 MB/s Feb 12 21:50:17.025569 kernel: raid6: using algorithm avx2x2 gen() 52168 MB/s Feb 12 21:50:17.025583 kernel: raid6: .... xor() 31689 MB/s, rmw enabled Feb 12 21:50:17.026803 kernel: raid6: using avx2x2 recovery algorithm Feb 12 21:50:17.036231 kernel: xor: automatically using best checksumming function avx Feb 12 21:50:17.097323 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 21:50:17.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:17.102446 systemd[1]: Finished dracut-pre-udev.service. Feb 12 21:50:17.101000 audit: BPF prog-id=7 op=LOAD Feb 12 21:50:17.101000 audit: BPF prog-id=8 op=LOAD Feb 12 21:50:17.103124 systemd[1]: Starting systemd-udevd.service... Feb 12 21:50:17.107231 kernel: audit: type=1130 audit(1707774617.101:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:17.114691 systemd-udevd[415]: Using default interface naming scheme 'v252'. Feb 12 21:50:17.117783 systemd[1]: Started systemd-udevd.service. Feb 12 21:50:17.118385 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 21:50:17.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:17.127032 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Feb 12 21:50:17.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:17.143586 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 21:50:17.144153 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 21:50:17.204837 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 21:50:17.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:17.252648 kernel: VMware PVSCSI driver - version 1.0.7.0-k Feb 12 21:50:17.252677 kernel: vmw_pvscsi: using 64bit dma Feb 12 21:50:17.252686 kernel: vmw_pvscsi: max_id: 16 Feb 12 21:50:17.252694 kernel: vmw_pvscsi: setting ring_pages to 8 Feb 12 21:50:17.261755 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Feb 12 21:50:17.261779 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Feb 12 21:50:17.267249 kernel: vmw_pvscsi: enabling reqCallThreshold Feb 12 21:50:17.267268 kernel: vmw_pvscsi: driver-based request coalescing enabled Feb 12 21:50:17.267283 kernel: vmw_pvscsi: using MSI-X Feb 12 21:50:17.267303 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Feb 12 21:50:17.272743 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Feb 12 21:50:17.272829 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Feb 12 21:50:17.275223 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Feb 12 21:50:17.295230 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Feb 12 21:50:17.296229 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 21:50:17.296245 kernel: libata version 3.00 loaded. Feb 12 21:50:17.303716 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 21:50:17.303739 kernel: AES CTR mode by8 optimization enabled Feb 12 21:50:17.308235 kernel: ata_piix 0000:00:07.1: version 2.13 Feb 12 21:50:17.312419 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Feb 12 21:50:17.312509 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 21:50:17.312568 kernel: scsi host1: ata_piix Feb 12 21:50:17.312623 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Feb 12 21:50:17.312678 kernel: sd 0:0:0:0: [sda] Cache data unavailable Feb 12 21:50:17.312736 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Feb 12 21:50:17.316061 kernel: scsi host2: ata_piix Feb 12 21:50:17.316136 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Feb 12 21:50:17.316145 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Feb 12 21:50:17.339235 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 21:50:17.341219 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 21:50:17.487250 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Feb 12 21:50:17.491225 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Feb 12 21:50:17.524299 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Feb 12 21:50:17.524468 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 21:50:17.531226 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (466) Feb 12 21:50:17.534238 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 21:50:17.538148 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 21:50:17.540092 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 21:50:17.540260 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 21:50:17.541220 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Feb 12 21:50:17.541672 systemd[1]: Starting disk-uuid.service... Feb 12 21:50:17.545784 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 21:50:17.760226 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 21:50:17.765224 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 21:50:18.793791 disk-uuid[548]: The operation has completed successfully. Feb 12 21:50:18.794226 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 21:50:18.886515 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 21:50:18.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:18.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:18.886587 systemd[1]: Finished disk-uuid.service. Feb 12 21:50:18.887240 systemd[1]: Starting verity-setup.service... Feb 12 21:50:18.910228 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 21:50:19.060111 systemd[1]: Found device dev-mapper-usr.device. Feb 12 21:50:19.060764 systemd[1]: Mounting sysusr-usr.mount... Feb 12 21:50:19.061291 systemd[1]: Finished verity-setup.service. Feb 12 21:50:19.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.122226 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 21:50:19.122265 systemd[1]: Mounted sysusr-usr.mount. Feb 12 21:50:19.122996 systemd[1]: Starting afterburn-network-kargs.service... Feb 12 21:50:19.123653 systemd[1]: Starting ignition-setup.service... Feb 12 21:50:19.208813 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:50:19.208848 kernel: BTRFS info (device sda6): using free space tree Feb 12 21:50:19.208861 kernel: BTRFS info (device sda6): has skinny extents Feb 12 21:50:19.216227 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 21:50:19.223779 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 21:50:19.230624 systemd[1]: Finished ignition-setup.service. Feb 12 21:50:19.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.231290 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 21:50:19.308400 systemd[1]: Finished afterburn-network-kargs.service. Feb 12 21:50:19.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.309007 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 21:50:19.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.346000 audit: BPF prog-id=9 op=LOAD Feb 12 21:50:19.347229 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 21:50:19.348077 systemd[1]: Starting systemd-networkd.service... Feb 12 21:50:19.361685 systemd-networkd[733]: lo: Link UP Feb 12 21:50:19.361691 systemd-networkd[733]: lo: Gained carrier Feb 12 21:50:19.362080 systemd-networkd[733]: Enumeration completed Feb 12 21:50:19.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.362232 systemd[1]: Started systemd-networkd.service. Feb 12 21:50:19.362366 systemd[1]: Reached target network.target. Feb 12 21:50:19.362402 systemd-networkd[733]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Feb 12 21:50:19.362833 systemd[1]: Starting iscsiuio.service... Feb 12 21:50:19.366652 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 12 21:50:19.366803 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 12 21:50:19.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.367050 systemd[1]: Started iscsiuio.service. Feb 12 21:50:19.367663 systemd[1]: Starting iscsid.service... Feb 12 21:50:19.368786 systemd-networkd[733]: ens192: Link UP Feb 12 21:50:19.368790 systemd-networkd[733]: ens192: Gained carrier Feb 12 21:50:19.369629 iscsid[738]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 21:50:19.369629 iscsid[738]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 21:50:19.369629 iscsid[738]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 21:50:19.369629 iscsid[738]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 21:50:19.369629 iscsid[738]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 21:50:19.370626 iscsid[738]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 21:50:19.370569 systemd[1]: Started iscsid.service. Feb 12 21:50:19.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.371367 systemd[1]: Starting dracut-initqueue.service... Feb 12 21:50:19.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.377506 systemd[1]: Finished dracut-initqueue.service. Feb 12 21:50:19.377654 systemd[1]: Reached target remote-fs-pre.target. Feb 12 21:50:19.377755 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 21:50:19.377880 systemd[1]: Reached target remote-fs.target. Feb 12 21:50:19.379379 systemd[1]: Starting dracut-pre-mount.service... Feb 12 21:50:19.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.385465 systemd[1]: Finished dracut-pre-mount.service. Feb 12 21:50:19.503938 ignition[604]: Ignition 2.14.0 Feb 12 21:50:19.504208 ignition[604]: Stage: fetch-offline Feb 12 21:50:19.504375 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:50:19.504532 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 21:50:19.532026 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 21:50:19.532328 ignition[604]: parsed url from cmdline: "" Feb 12 21:50:19.532372 ignition[604]: no config URL provided Feb 12 21:50:19.532491 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 21:50:19.532631 ignition[604]: no config at "/usr/lib/ignition/user.ign" Feb 12 21:50:19.543539 ignition[604]: config successfully fetched Feb 12 21:50:19.543635 ignition[604]: parsing config with SHA512: ad5649fd97f39eb8356bcac83d8ac451a5ea774bad1c953f6225a19de096ef59895d143e5d4362366cbe91e1f87f613987d7bea7e9dd56453fa218fc1a595bb5 Feb 12 21:50:19.573044 unknown[604]: fetched base config from "system" Feb 12 21:50:19.573051 unknown[604]: fetched user config from "vmware" Feb 12 21:50:19.573781 ignition[604]: fetch-offline: fetch-offline passed Feb 12 21:50:19.573827 ignition[604]: Ignition finished successfully Feb 12 21:50:19.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.574750 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 21:50:19.574916 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 21:50:19.575419 systemd[1]: Starting ignition-kargs.service... Feb 12 21:50:19.580897 ignition[752]: Ignition 2.14.0 Feb 12 21:50:19.580903 ignition[752]: Stage: kargs Feb 12 21:50:19.580969 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:50:19.580979 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 21:50:19.582428 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 21:50:19.584348 ignition[752]: kargs: kargs passed Feb 12 21:50:19.584393 ignition[752]: Ignition finished successfully Feb 12 21:50:19.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.585580 systemd[1]: Finished ignition-kargs.service. Feb 12 21:50:19.586271 systemd[1]: Starting ignition-disks.service... Feb 12 21:50:19.590910 ignition[759]: Ignition 2.14.0 Feb 12 21:50:19.591182 ignition[759]: Stage: disks Feb 12 21:50:19.591388 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:50:19.591721 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 21:50:19.593258 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 21:50:19.594982 ignition[759]: disks: disks passed Feb 12 21:50:19.595028 ignition[759]: Ignition finished successfully Feb 12 21:50:19.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.595724 systemd[1]: Finished ignition-disks.service. Feb 12 21:50:19.595912 systemd[1]: Reached target initrd-root-device.target. Feb 12 21:50:19.596006 systemd[1]: Reached target local-fs-pre.target. Feb 12 21:50:19.596091 systemd[1]: Reached target local-fs.target. Feb 12 21:50:19.596171 systemd[1]: Reached target sysinit.target. Feb 12 21:50:19.596295 systemd[1]: Reached target basic.target. Feb 12 21:50:19.596912 systemd[1]: Starting systemd-fsck-root.service... Feb 12 21:50:19.645954 systemd-fsck[767]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 21:50:19.654892 systemd[1]: Finished systemd-fsck-root.service. Feb 12 21:50:19.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.655462 systemd[1]: Mounting sysroot.mount... Feb 12 21:50:19.709233 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 21:50:19.709677 systemd[1]: Mounted sysroot.mount. Feb 12 21:50:19.709882 systemd[1]: Reached target initrd-root-fs.target. Feb 12 21:50:19.711052 systemd[1]: Mounting sysroot-usr.mount... Feb 12 21:50:19.711552 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 21:50:19.711586 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 21:50:19.711607 systemd[1]: Reached target ignition-diskful.target. Feb 12 21:50:19.714726 systemd[1]: Mounted sysroot-usr.mount. Feb 12 21:50:19.715437 systemd[1]: Starting initrd-setup-root.service... Feb 12 21:50:19.719291 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 21:50:19.723890 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Feb 12 21:50:19.727487 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 21:50:19.730717 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 21:50:19.759243 systemd[1]: Finished initrd-setup-root.service. Feb 12 21:50:19.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.759899 systemd[1]: Starting ignition-mount.service... Feb 12 21:50:19.760412 systemd[1]: Starting sysroot-boot.service... Feb 12 21:50:19.764417 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 21:50:19.769825 ignition[819]: INFO : Ignition 2.14.0 Feb 12 21:50:19.769825 ignition[819]: INFO : Stage: mount Feb 12 21:50:19.769825 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:50:19.769825 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 21:50:19.771091 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 21:50:19.772522 ignition[819]: INFO : mount: mount passed Feb 12 21:50:19.772645 ignition[819]: INFO : Ignition finished successfully Feb 12 21:50:19.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.773156 systemd[1]: Finished ignition-mount.service. Feb 12 21:50:19.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:19.780809 systemd[1]: Finished sysroot-boot.service. Feb 12 21:50:20.075665 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 21:50:20.084254 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (828) Feb 12 21:50:20.086528 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:50:20.086547 kernel: BTRFS info (device sda6): using free space tree Feb 12 21:50:20.086576 kernel: BTRFS info (device sda6): has skinny extents Feb 12 21:50:20.096228 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 21:50:20.098365 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 21:50:20.099030 systemd[1]: Starting ignition-files.service... Feb 12 21:50:20.109023 ignition[848]: INFO : Ignition 2.14.0 Feb 12 21:50:20.109023 ignition[848]: INFO : Stage: files Feb 12 21:50:20.109398 ignition[848]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:50:20.109398 ignition[848]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 21:50:20.110394 ignition[848]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 21:50:20.116716 ignition[848]: DEBUG : files: compiled without relabeling support, skipping Feb 12 21:50:20.117297 ignition[848]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 21:50:20.117297 ignition[848]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 21:50:20.130373 ignition[848]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 21:50:20.130639 ignition[848]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 21:50:20.139164 unknown[848]: wrote ssh authorized keys file for user: core Feb 12 21:50:20.139444 ignition[848]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 21:50:20.146367 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 21:50:20.146563 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 21:50:20.203660 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 21:50:20.262431 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 21:50:20.262765 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 21:50:20.263015 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 21:50:20.691483 systemd-networkd[733]: ens192: Gained IPv6LL Feb 12 21:50:20.727353 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 21:50:20.852546 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 21:50:20.852846 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 21:50:20.852846 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 21:50:20.852846 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 21:50:21.269382 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 21:50:21.352873 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 21:50:21.353241 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 21:50:21.359633 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 21:50:21.359839 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 21:50:21.520355 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 21:50:21.678339 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 21:50:21.678668 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 21:50:21.678668 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 21:50:21.678668 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 21:50:21.724752 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 21:50:22.137782 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 21:50:22.138131 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 21:50:22.138333 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 21:50:22.138529 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 12 21:50:22.185956 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 21:50:22.327728 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 21:50:22.328144 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 21:50:22.329547 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 21:50:22.329547 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 21:50:22.332744 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 21:50:22.332744 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 21:50:22.344036 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 12 21:50:22.344275 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:50:22.350295 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3700731724" Feb 12 21:50:22.351706 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (850) Feb 12 21:50:22.351724 ignition[848]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3700731724": device or resource busy Feb 12 21:50:22.351724 ignition[848]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3700731724", trying btrfs: device or resource busy Feb 12 21:50:22.351724 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3700731724" Feb 12 21:50:22.352271 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3700731724" Feb 12 21:50:22.368861 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3700731724" Feb 12 21:50:22.369493 systemd[1]: mnt-oem3700731724.mount: Deactivated successfully. Feb 12 21:50:22.369754 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3700731724" Feb 12 21:50:22.369919 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 12 21:50:22.379593 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 12 21:50:22.379775 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(14): [started] processing unit "vmtoolsd.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(14): [finished] processing unit "vmtoolsd.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 12 21:50:22.379775 ignition[848]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1b): [started] processing unit "coreos-metadata.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1b): op(1c): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1b): op(1c): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1b): [finished] processing unit "coreos-metadata.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1d): [started] setting preset to enabled for "vmtoolsd.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1d): [finished] setting preset to enabled for "vmtoolsd.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(21): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 21:50:22.381124 ignition[848]: INFO : files: op(21): op(22): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 21:50:23.011128 ignition[848]: INFO : files: op(21): op(22): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 21:50:23.011396 ignition[848]: INFO : files: op(21): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 21:50:23.011396 ignition[848]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 21:50:23.011396 ignition[848]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 21:50:23.011396 ignition[848]: INFO : files: files passed Feb 12 21:50:23.011396 ignition[848]: INFO : Ignition finished successfully Feb 12 21:50:23.012741 systemd[1]: Finished ignition-files.service. Feb 12 21:50:23.016252 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 12 21:50:23.016267 kernel: audit: type=1130 audit(1707774623.011:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.013558 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 21:50:23.016315 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 21:50:23.016752 systemd[1]: Starting ignition-quench.service... Feb 12 21:50:23.026533 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 21:50:23.026582 systemd[1]: Finished ignition-quench.service. Feb 12 21:50:23.031718 kernel: audit: type=1130 audit(1707774623.025:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.031735 kernel: audit: type=1131 audit(1707774623.025:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.031809 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 21:50:23.034741 kernel: audit: type=1130 audit(1707774623.030:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.031762 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 21:50:23.031900 systemd[1]: Reached target ignition-complete.target. Feb 12 21:50:23.035224 systemd[1]: Starting initrd-parse-etc.service... Feb 12 21:50:23.043642 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 21:50:23.043700 systemd[1]: Finished initrd-parse-etc.service. Feb 12 21:50:23.043944 systemd[1]: Reached target initrd-fs.target. Feb 12 21:50:23.049016 kernel: audit: type=1130 audit(1707774623.042:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.049033 kernel: audit: type=1131 audit(1707774623.042:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.048908 systemd[1]: Reached target initrd.target. Feb 12 21:50:23.049133 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 21:50:23.049643 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 21:50:23.059235 kernel: audit: type=1130 audit(1707774623.055:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.056369 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 21:50:23.056959 systemd[1]: Starting initrd-cleanup.service... Feb 12 21:50:23.064902 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 21:50:23.064966 systemd[1]: Finished initrd-cleanup.service. Feb 12 21:50:23.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.065667 systemd[1]: Stopped target nss-lookup.target. Feb 12 21:50:23.070378 kernel: audit: type=1130 audit(1707774623.063:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.070395 kernel: audit: type=1131 audit(1707774623.063:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.069925 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 21:50:23.070018 systemd[1]: Stopped target timers.target. Feb 12 21:50:23.070116 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 21:50:23.070142 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 21:50:23.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.070910 systemd[1]: Stopped target initrd.target. Feb 12 21:50:23.073382 kernel: audit: type=1131 audit(1707774623.069:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.073295 systemd[1]: Stopped target basic.target. Feb 12 21:50:23.073448 systemd[1]: Stopped target ignition-complete.target. Feb 12 21:50:23.073605 systemd[1]: Stopped target ignition-diskful.target. Feb 12 21:50:23.073772 systemd[1]: Stopped target initrd-root-device.target. Feb 12 21:50:23.073942 systemd[1]: Stopped target remote-fs.target. Feb 12 21:50:23.074103 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 21:50:23.074273 systemd[1]: Stopped target sysinit.target. Feb 12 21:50:23.074427 systemd[1]: Stopped target local-fs.target. Feb 12 21:50:23.074579 systemd[1]: Stopped target local-fs-pre.target. Feb 12 21:50:23.074737 systemd[1]: Stopped target swap.target. Feb 12 21:50:23.074895 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 21:50:23.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.074918 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 21:50:23.075072 systemd[1]: Stopped target cryptsetup.target. Feb 12 21:50:23.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.075231 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 21:50:23.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.075252 systemd[1]: Stopped dracut-initqueue.service. Feb 12 21:50:23.075414 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 21:50:23.075433 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 21:50:23.075573 systemd[1]: Stopped target paths.target. Feb 12 21:50:23.075721 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 21:50:23.080266 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 21:50:23.080375 systemd[1]: Stopped target slices.target. Feb 12 21:50:23.080542 systemd[1]: Stopped target sockets.target. Feb 12 21:50:23.080718 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 21:50:23.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.080740 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 21:50:23.080886 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 21:50:23.080905 systemd[1]: Stopped ignition-files.service. Feb 12 21:50:23.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.081448 systemd[1]: Stopping ignition-mount.service... Feb 12 21:50:23.081676 iscsid[738]: iscsid shutting down. Feb 12 21:50:23.082242 systemd[1]: Stopping iscsid.service... Feb 12 21:50:23.082676 systemd[1]: Stopping sysroot-boot.service... Feb 12 21:50:23.082775 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 21:50:23.082801 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 21:50:23.082924 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 21:50:23.082943 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 21:50:23.083271 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 21:50:23.083316 systemd[1]: Stopped iscsid.service. Feb 12 21:50:23.083445 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 21:50:23.083462 systemd[1]: Closed iscsid.socket. Feb 12 21:50:23.083916 systemd[1]: Stopping iscsiuio.service... Feb 12 21:50:23.088397 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 21:50:23.088442 systemd[1]: Stopped iscsiuio.service. Feb 12 21:50:23.088572 systemd[1]: Stopped target network.target. Feb 12 21:50:23.088668 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 21:50:23.088684 systemd[1]: Closed iscsiuio.socket. Feb 12 21:50:23.089005 systemd[1]: Stopping systemd-networkd.service... Feb 12 21:50:23.089131 systemd[1]: Stopping systemd-resolved.service... Feb 12 21:50:23.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.091439 ignition[887]: INFO : Ignition 2.14.0 Feb 12 21:50:23.091632 ignition[887]: INFO : Stage: umount Feb 12 21:50:23.091812 ignition[887]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:50:23.091962 ignition[887]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 21:50:23.092889 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 21:50:23.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.093122 systemd[1]: Stopped systemd-networkd.service. Feb 12 21:50:23.093336 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 21:50:23.093385 systemd[1]: Stopped systemd-resolved.service. Feb 12 21:50:23.093589 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 21:50:23.093605 systemd[1]: Closed systemd-networkd.socket. Feb 12 21:50:23.094061 systemd[1]: Stopping network-cleanup.service... Feb 12 21:50:23.094153 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 21:50:23.094178 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 21:50:23.094307 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Feb 12 21:50:23.094328 systemd[1]: Stopped afterburn-network-kargs.service. Feb 12 21:50:23.094435 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 21:50:23.094466 systemd[1]: Stopped systemd-sysctl.service. Feb 12 21:50:23.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.096561 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 21:50:23.096586 systemd[1]: Stopped systemd-modules-load.service. Feb 12 21:50:23.096000 audit: BPF prog-id=9 op=UNLOAD Feb 12 21:50:23.096000 audit: BPF prog-id=6 op=UNLOAD Feb 12 21:50:23.097693 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 21:50:23.098072 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 21:50:23.101197 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 21:50:23.101259 systemd[1]: Stopped network-cleanup.service. Feb 12 21:50:23.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.101940 ignition[887]: INFO : umount: umount passed Feb 12 21:50:23.102086 ignition[887]: INFO : Ignition finished successfully Feb 12 21:50:23.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.102659 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 21:50:23.102715 systemd[1]: Stopped ignition-mount.service. Feb 12 21:50:23.102849 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 21:50:23.102872 systemd[1]: Stopped ignition-disks.service. Feb 12 21:50:23.102996 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 21:50:23.103025 systemd[1]: Stopped ignition-kargs.service. Feb 12 21:50:23.103134 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 21:50:23.103158 systemd[1]: Stopped ignition-setup.service. Feb 12 21:50:23.103309 systemd[1]: Stopping systemd-udevd.service... Feb 12 21:50:23.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.110123 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 21:50:23.110191 systemd[1]: Stopped systemd-udevd.service. Feb 12 21:50:23.110362 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 21:50:23.110381 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 21:50:23.110477 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 21:50:23.110492 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 21:50:23.110578 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 21:50:23.110597 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 21:50:23.110694 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 21:50:23.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.110713 systemd[1]: Stopped dracut-cmdline.service. Feb 12 21:50:23.110804 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 21:50:23.110823 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 21:50:23.112325 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 21:50:23.112412 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 21:50:23.112436 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 21:50:23.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.113570 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 21:50:23.113594 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 21:50:23.113714 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 21:50:23.113733 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 21:50:23.114471 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 21:50:23.114513 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 21:50:23.114811 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 21:50:23.114852 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 21:50:23.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.121771 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 21:50:23.121821 systemd[1]: Stopped sysroot-boot.service. Feb 12 21:50:23.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.122068 systemd[1]: Reached target initrd-switch-root.target. Feb 12 21:50:23.122185 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 21:50:23.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.122221 systemd[1]: Stopped initrd-setup-root.service. Feb 12 21:50:23.122732 systemd[1]: Starting initrd-switch-root.service... Feb 12 21:50:23.129796 systemd[1]: Switching root. Feb 12 21:50:23.147528 systemd-journald[217]: Journal stopped Feb 12 21:50:26.216125 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Feb 12 21:50:26.216144 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 21:50:26.216153 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 21:50:26.216159 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 21:50:26.216164 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 21:50:26.216170 kernel: SELinux: policy capability open_perms=1 Feb 12 21:50:26.216177 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 21:50:26.216182 kernel: SELinux: policy capability always_check_network=0 Feb 12 21:50:26.216188 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 21:50:26.216193 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 21:50:26.216199 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 21:50:26.216204 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 21:50:26.216217 systemd[1]: Successfully loaded SELinux policy in 42.540ms. Feb 12 21:50:26.216225 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.413ms. Feb 12 21:50:26.216233 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 21:50:26.216240 systemd[1]: Detected virtualization vmware. Feb 12 21:50:26.216248 systemd[1]: Detected architecture x86-64. Feb 12 21:50:26.216254 systemd[1]: Detected first boot. Feb 12 21:50:26.216261 systemd[1]: Initializing machine ID from random generator. Feb 12 21:50:26.216267 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 21:50:26.216273 systemd[1]: Populated /etc with preset unit settings. Feb 12 21:50:26.216280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:50:26.216286 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:50:26.216296 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:50:26.216304 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 21:50:26.216311 systemd[1]: Stopped initrd-switch-root.service. Feb 12 21:50:26.216317 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 21:50:26.216323 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 21:50:26.216330 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 21:50:26.216336 systemd[1]: Created slice system-getty.slice. Feb 12 21:50:26.216342 systemd[1]: Created slice system-modprobe.slice. Feb 12 21:50:26.216351 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 21:50:26.216357 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 21:50:26.216364 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 21:50:26.216370 systemd[1]: Created slice user.slice. Feb 12 21:50:26.216376 systemd[1]: Started systemd-ask-password-console.path. Feb 12 21:50:26.216382 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 21:50:26.216388 systemd[1]: Set up automount boot.automount. Feb 12 21:50:26.216395 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 21:50:26.216402 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 21:50:26.216409 systemd[1]: Stopped target initrd-fs.target. Feb 12 21:50:26.216417 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 21:50:26.216423 systemd[1]: Reached target integritysetup.target. Feb 12 21:50:26.216430 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 21:50:26.216436 systemd[1]: Reached target remote-fs.target. Feb 12 21:50:26.216442 systemd[1]: Reached target slices.target. Feb 12 21:50:26.216449 systemd[1]: Reached target swap.target. Feb 12 21:50:26.216455 systemd[1]: Reached target torcx.target. Feb 12 21:50:26.216463 systemd[1]: Reached target veritysetup.target. Feb 12 21:50:26.216469 systemd[1]: Listening on systemd-coredump.socket. Feb 12 21:50:26.216476 systemd[1]: Listening on systemd-initctl.socket. Feb 12 21:50:26.216483 systemd[1]: Listening on systemd-networkd.socket. Feb 12 21:50:26.216489 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 21:50:26.216496 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 21:50:26.216504 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 21:50:26.216510 systemd[1]: Mounting dev-hugepages.mount... Feb 12 21:50:26.216517 systemd[1]: Mounting dev-mqueue.mount... Feb 12 21:50:26.216524 systemd[1]: Mounting media.mount... Feb 12 21:50:26.216531 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 21:50:26.216538 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 21:50:26.216544 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 21:50:26.216552 systemd[1]: Mounting tmp.mount... Feb 12 21:50:26.216559 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 21:50:26.216566 systemd[1]: Starting ignition-delete-config.service... Feb 12 21:50:26.216573 systemd[1]: Starting kmod-static-nodes.service... Feb 12 21:50:26.216579 systemd[1]: Starting modprobe@configfs.service... Feb 12 21:50:26.216586 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 21:50:26.216592 systemd[1]: Starting modprobe@drm.service... Feb 12 21:50:26.216599 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 21:50:26.216606 systemd[1]: Starting modprobe@fuse.service... Feb 12 21:50:26.216614 systemd[1]: Starting modprobe@loop.service... Feb 12 21:50:26.216621 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 21:50:26.216627 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 21:50:26.216634 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 21:50:26.216640 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 21:50:26.216647 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 21:50:26.216653 systemd[1]: Stopped systemd-journald.service. Feb 12 21:50:26.216660 systemd[1]: Starting systemd-journald.service... Feb 12 21:50:26.216667 systemd[1]: Starting systemd-modules-load.service... Feb 12 21:50:26.216675 systemd[1]: Starting systemd-network-generator.service... Feb 12 21:50:26.216682 systemd[1]: Starting systemd-remount-fs.service... Feb 12 21:50:26.216688 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 21:50:26.216695 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 21:50:26.216701 systemd[1]: Stopped verity-setup.service. Feb 12 21:50:26.216708 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 21:50:26.216715 systemd[1]: Mounted dev-hugepages.mount. Feb 12 21:50:26.216721 systemd[1]: Mounted dev-mqueue.mount. Feb 12 21:50:26.216728 systemd[1]: Mounted media.mount. Feb 12 21:50:26.216736 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 21:50:26.216742 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 21:50:26.216749 systemd[1]: Mounted tmp.mount. Feb 12 21:50:26.216756 systemd[1]: Finished kmod-static-nodes.service. Feb 12 21:50:26.216763 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 21:50:26.216769 systemd[1]: Finished modprobe@configfs.service. Feb 12 21:50:26.216776 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 21:50:26.216783 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 21:50:26.216792 systemd-journald[1017]: Journal started Feb 12 21:50:26.216821 systemd-journald[1017]: Runtime Journal (/run/log/journal/d5fe599884074658b2528982cd76c31b) is 4.8M, max 38.8M, 34.0M free. Feb 12 21:50:23.324000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 21:50:23.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:50:23.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:50:23.498000 audit: BPF prog-id=10 op=LOAD Feb 12 21:50:23.498000 audit: BPF prog-id=10 op=UNLOAD Feb 12 21:50:23.498000 audit: BPF prog-id=11 op=LOAD Feb 12 21:50:23.498000 audit: BPF prog-id=11 op=UNLOAD Feb 12 21:50:23.729000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 21:50:23.729000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:50:23.729000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:50:23.731000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 21:50:23.731000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:50:23.731000 audit: CWD cwd="/" Feb 12 21:50:23.731000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:23.731000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:23.731000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:50:26.106000 audit: BPF prog-id=12 op=LOAD Feb 12 21:50:26.106000 audit: BPF prog-id=3 op=UNLOAD Feb 12 21:50:26.106000 audit: BPF prog-id=13 op=LOAD Feb 12 21:50:26.106000 audit: BPF prog-id=14 op=LOAD Feb 12 21:50:26.106000 audit: BPF prog-id=4 op=UNLOAD Feb 12 21:50:26.106000 audit: BPF prog-id=5 op=UNLOAD Feb 12 21:50:26.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.108000 audit: BPF prog-id=12 op=UNLOAD Feb 12 21:50:26.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.181000 audit: BPF prog-id=15 op=LOAD Feb 12 21:50:26.181000 audit: BPF prog-id=16 op=LOAD Feb 12 21:50:26.181000 audit: BPF prog-id=17 op=LOAD Feb 12 21:50:26.181000 audit: BPF prog-id=13 op=UNLOAD Feb 12 21:50:26.181000 audit: BPF prog-id=14 op=UNLOAD Feb 12 21:50:26.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.212000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 21:50:26.212000 audit[1017]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd3f9bac00 a2=4000 a3=7ffd3f9bac9c items=0 ppid=1 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:50:26.212000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 21:50:26.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.727590 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:50:26.105104 systemd[1]: Queued start job for default target multi-user.target. Feb 12 21:50:23.728255 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 21:50:26.107896 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 21:50:23.728269 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 21:50:26.220683 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 21:50:26.220702 systemd[1]: Finished modprobe@drm.service. Feb 12 21:50:26.220713 systemd[1]: Started systemd-journald.service. Feb 12 21:50:26.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.728294 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 21:50:26.220578 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 21:50:23.728301 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 21:50:26.220661 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 21:50:26.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:23.728322 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 21:50:26.220913 systemd[1]: Finished systemd-modules-load.service. Feb 12 21:50:23.728331 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 21:50:23.728471 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 21:50:26.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.221164 systemd[1]: Finished systemd-network-generator.service. Feb 12 21:50:23.728498 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 21:50:26.221342 jq[988]: true Feb 12 21:50:23.728508 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 21:50:26.221436 systemd[1]: Finished systemd-remount-fs.service. Feb 12 21:50:23.729322 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 21:50:23.729344 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 21:50:23.729356 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 21:50:26.222239 kernel: fuse: init (API version 7.34) Feb 12 21:50:23.729366 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 21:50:23.729376 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 21:50:23.729385 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 21:50:25.835790 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:50:25.835940 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:50:25.835998 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:50:26.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:25.836273 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:50:25.836317 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 21:50:26.222684 jq[1026]: true Feb 12 21:50:25.836368 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-02-12T21:50:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 21:50:26.223460 systemd[1]: Reached target network-pre.target. Feb 12 21:50:26.224555 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 21:50:26.226295 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 21:50:26.227706 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 21:50:26.228882 systemd[1]: Starting systemd-journal-flush.service... Feb 12 21:50:26.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.229080 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 21:50:26.230131 systemd[1]: Starting systemd-random-seed.service... Feb 12 21:50:26.231470 systemd[1]: Starting systemd-sysctl.service... Feb 12 21:50:26.238292 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 21:50:26.238374 systemd[1]: Finished modprobe@fuse.service. Feb 12 21:50:26.238562 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 21:50:26.239692 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 21:50:26.241546 systemd-journald[1017]: Time spent on flushing to /var/log/journal/d5fe599884074658b2528982cd76c31b is 65.700ms for 2031 entries. Feb 12 21:50:26.241546 systemd-journald[1017]: System Journal (/var/log/journal/d5fe599884074658b2528982cd76c31b) is 8.0M, max 584.8M, 576.8M free. Feb 12 21:50:26.339548 systemd-journald[1017]: Received client request to flush runtime journal. Feb 12 21:50:26.339594 kernel: loop: module loaded Feb 12 21:50:26.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.242449 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 21:50:26.246268 systemd[1]: Finished systemd-random-seed.service. Feb 12 21:50:26.246445 systemd[1]: Reached target first-boot-complete.target. Feb 12 21:50:26.247866 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 21:50:26.249012 systemd[1]: Starting systemd-sysusers.service... Feb 12 21:50:26.263282 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 21:50:26.263956 systemd[1]: Finished modprobe@loop.service. Feb 12 21:50:26.264168 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 21:50:26.296850 systemd[1]: Finished systemd-sysctl.service. Feb 12 21:50:26.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.340999 systemd[1]: Finished systemd-journal-flush.service. Feb 12 21:50:26.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.350002 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 21:50:26.351020 systemd[1]: Starting systemd-udev-settle.service... Feb 12 21:50:26.357067 udevadm[1050]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 21:50:26.379779 systemd[1]: Finished systemd-sysusers.service. Feb 12 21:50:26.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.380846 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 21:50:26.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.472998 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 21:50:26.514467 ignition[1031]: Ignition 2.14.0 Feb 12 21:50:26.514686 ignition[1031]: deleting config from guestinfo properties Feb 12 21:50:26.518120 ignition[1031]: Successfully deleted config Feb 12 21:50:26.518797 systemd[1]: Finished ignition-delete-config.service. Feb 12 21:50:26.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.765875 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 21:50:26.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.765000 audit: BPF prog-id=18 op=LOAD Feb 12 21:50:26.765000 audit: BPF prog-id=19 op=LOAD Feb 12 21:50:26.765000 audit: BPF prog-id=7 op=UNLOAD Feb 12 21:50:26.765000 audit: BPF prog-id=8 op=UNLOAD Feb 12 21:50:26.767005 systemd[1]: Starting systemd-udevd.service... Feb 12 21:50:26.779714 systemd-udevd[1054]: Using default interface naming scheme 'v252'. Feb 12 21:50:26.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.800000 audit: BPF prog-id=20 op=LOAD Feb 12 21:50:26.800712 systemd[1]: Started systemd-udevd.service. Feb 12 21:50:26.802457 systemd[1]: Starting systemd-networkd.service... Feb 12 21:50:26.815000 audit: BPF prog-id=21 op=LOAD Feb 12 21:50:26.815000 audit: BPF prog-id=22 op=LOAD Feb 12 21:50:26.815000 audit: BPF prog-id=23 op=LOAD Feb 12 21:50:26.816886 systemd[1]: Starting systemd-userdbd.service... Feb 12 21:50:26.824712 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 21:50:26.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.855274 systemd[1]: Started systemd-userdbd.service. Feb 12 21:50:26.864225 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 21:50:26.868223 kernel: ACPI: button: Power Button [PWRF] Feb 12 21:50:26.917000 audit[1067]: AVC avc: denied { confidentiality } for pid=1067 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 21:50:26.917000 audit[1067]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56467c0ba070 a1=32194 a2=7f04235d8bc5 a3=5 items=108 ppid=1054 pid=1067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:50:26.917000 audit: CWD cwd="/" Feb 12 21:50:26.917000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=1 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=2 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=3 name=(null) inode=16831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=4 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=5 name=(null) inode=16832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=6 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=7 name=(null) inode=16833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=8 name=(null) inode=16833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=9 name=(null) inode=16834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=10 name=(null) inode=16833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=11 name=(null) inode=16835 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=12 name=(null) inode=16833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=13 name=(null) inode=16836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=14 name=(null) inode=16833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=15 name=(null) inode=16837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=16 name=(null) inode=16833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=17 name=(null) inode=16838 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=18 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=19 name=(null) inode=16839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=20 name=(null) inode=16839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=21 name=(null) inode=16840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=22 name=(null) inode=16839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=23 name=(null) inode=16841 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=24 name=(null) inode=16839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=25 name=(null) inode=16842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=26 name=(null) inode=16839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=27 name=(null) inode=16843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=28 name=(null) inode=16839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=29 name=(null) inode=16844 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=30 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=31 name=(null) inode=16845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=32 name=(null) inode=16845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=33 name=(null) inode=16846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=34 name=(null) inode=16845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.928486 systemd-networkd[1066]: lo: Link UP Feb 12 21:50:26.928492 systemd-networkd[1066]: lo: Gained carrier Feb 12 21:50:26.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:26.928770 systemd-networkd[1066]: Enumeration completed Feb 12 21:50:26.928822 systemd[1]: Started systemd-networkd.service. Feb 12 21:50:26.928834 systemd-networkd[1066]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Feb 12 21:50:26.917000 audit: PATH item=35 name=(null) inode=16847 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=36 name=(null) inode=16845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=37 name=(null) inode=16848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=38 name=(null) inode=16845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=39 name=(null) inode=16849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=40 name=(null) inode=16845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=41 name=(null) inode=16850 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=42 name=(null) inode=16830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=43 name=(null) inode=16851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=44 name=(null) inode=16851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=45 name=(null) inode=16852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=46 name=(null) inode=16851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=47 name=(null) inode=16853 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=48 name=(null) inode=16851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=49 name=(null) inode=16854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=50 name=(null) inode=16851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.931914 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 12 21:50:26.933330 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 12 21:50:26.933477 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Feb 12 21:50:26.917000 audit: PATH item=51 name=(null) inode=16855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.933546 systemd-networkd[1066]: ens192: Link UP Feb 12 21:50:26.917000 audit: PATH item=52 name=(null) inode=16851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.933623 systemd-networkd[1066]: ens192: Gained carrier Feb 12 21:50:26.917000 audit: PATH item=53 name=(null) inode=16856 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=55 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=56 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=57 name=(null) inode=16858 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=58 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=59 name=(null) inode=16859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=60 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=61 name=(null) inode=16860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=62 name=(null) inode=16860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=63 name=(null) inode=16861 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=64 name=(null) inode=16860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=65 name=(null) inode=16862 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=66 name=(null) inode=16860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=67 name=(null) inode=16863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=68 name=(null) inode=16860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=69 name=(null) inode=16864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=70 name=(null) inode=16860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=71 name=(null) inode=16865 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=72 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=73 name=(null) inode=16866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=74 name=(null) inode=16866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=75 name=(null) inode=16867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=76 name=(null) inode=16866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=77 name=(null) inode=16868 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=78 name=(null) inode=16866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=79 name=(null) inode=16869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=80 name=(null) inode=16866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=81 name=(null) inode=16870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=82 name=(null) inode=16866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=83 name=(null) inode=16871 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=84 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=85 name=(null) inode=16872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=86 name=(null) inode=16872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=87 name=(null) inode=16873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=88 name=(null) inode=16872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=89 name=(null) inode=16874 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=90 name=(null) inode=16872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=91 name=(null) inode=16875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=92 name=(null) inode=16872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=93 name=(null) inode=16876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=94 name=(null) inode=16872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=95 name=(null) inode=16877 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.941220 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1069) Feb 12 21:50:26.917000 audit: PATH item=96 name=(null) inode=16857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=97 name=(null) inode=16878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=98 name=(null) inode=16878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=99 name=(null) inode=16879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=100 name=(null) inode=16878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=101 name=(null) inode=16880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=102 name=(null) inode=16878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=103 name=(null) inode=16881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=104 name=(null) inode=16878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=105 name=(null) inode=16882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=106 name=(null) inode=16878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PATH item=107 name=(null) inode=16883 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:50:26.917000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 21:50:26.951230 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Feb 12 21:50:26.954245 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Feb 12 21:50:26.960230 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Feb 12 21:50:26.960371 kernel: Guest personality initialized and is active Feb 12 21:50:26.970224 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 21:50:26.971920 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 21:50:26.972223 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Feb 12 21:50:26.972251 kernel: Initialized host personality Feb 12 21:50:26.996236 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 21:50:27.000108 (udev-worker)[1068]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Feb 12 21:50:27.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:27.013534 systemd[1]: Finished systemd-udev-settle.service. Feb 12 21:50:27.014538 systemd[1]: Starting lvm2-activation-early.service... Feb 12 21:50:27.031974 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 21:50:27.049786 systemd[1]: Finished lvm2-activation-early.service. Feb 12 21:50:27.049968 systemd[1]: Reached target cryptsetup.target. Feb 12 21:50:27.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:27.051030 systemd[1]: Starting lvm2-activation.service... Feb 12 21:50:27.053699 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 21:50:27.067791 systemd[1]: Finished lvm2-activation.service. Feb 12 21:50:27.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:27.067971 systemd[1]: Reached target local-fs-pre.target. Feb 12 21:50:27.068691 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 21:50:27.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:27.075428 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 21:50:27.201862 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 21:50:27.201878 systemd[1]: Reached target local-fs.target. Feb 12 21:50:27.201990 systemd[1]: Reached target machines.target. Feb 12 21:50:27.202935 systemd[1]: Starting ldconfig.service... Feb 12 21:50:27.204887 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 21:50:27.204909 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:50:27.205604 systemd[1]: Starting systemd-boot-update.service... Feb 12 21:50:27.206383 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 21:50:27.206534 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 21:50:27.206559 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 21:50:27.207343 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 21:50:27.223467 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 21:50:27.231323 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 21:50:27.231724 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1092 (bootctl) Feb 12 21:50:27.232477 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 21:50:27.244676 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 21:50:28.151885 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 21:50:28.152739 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 21:50:28.156762 kernel: kauditd_printk_skb: 225 callbacks suppressed Feb 12 21:50:28.156803 kernel: audit: type=1130 audit(1707774628.151:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.160217 systemd-fsck[1098]: fsck.fat 4.2 (2021-01-31) Feb 12 21:50:28.160217 systemd-fsck[1098]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 21:50:28.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.161219 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 21:50:28.162185 systemd[1]: Mounting boot.mount... Feb 12 21:50:28.165280 kernel: audit: type=1130 audit(1707774628.160:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.168310 systemd[1]: Mounted boot.mount. Feb 12 21:50:28.200085 systemd[1]: Finished systemd-boot-update.service. Feb 12 21:50:28.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.203223 kernel: audit: type=1130 audit(1707774628.198:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.233689 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 21:50:28.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.241438 kernel: audit: type=1130 audit(1707774628.232:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.241493 kernel: audit: type=1334 audit(1707774628.238:154): prog-id=24 op=LOAD Feb 12 21:50:28.238000 audit: BPF prog-id=24 op=LOAD Feb 12 21:50:28.237327 systemd[1]: Starting audit-rules.service... Feb 12 21:50:28.238112 systemd[1]: Starting clean-ca-certificates.service... Feb 12 21:50:28.238954 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 21:50:28.240717 systemd[1]: Starting systemd-resolved.service... Feb 12 21:50:28.244179 kernel: audit: type=1334 audit(1707774628.241:155): prog-id=25 op=LOAD Feb 12 21:50:28.241000 audit: BPF prog-id=25 op=LOAD Feb 12 21:50:28.243507 systemd[1]: Starting systemd-timesyncd.service... Feb 12 21:50:28.244596 systemd[1]: Starting systemd-update-utmp.service... Feb 12 21:50:28.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.251343 systemd[1]: Finished clean-ca-certificates.service. Feb 12 21:50:28.251529 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 21:50:28.253613 systemd[1]: Finished systemd-update-utmp.service. Feb 12 21:50:28.251000 audit[1106]: SYSTEM_BOOT pid=1106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.257107 kernel: audit: type=1130 audit(1707774628.250:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.257141 kernel: audit: type=1127 audit(1707774628.251:157): pid=1106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.257155 kernel: audit: type=1130 audit(1707774628.255:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.285877 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 21:50:28.289229 kernel: audit: type=1130 audit(1707774628.284:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.293578 systemd-resolved[1104]: Positive Trust Anchors: Feb 12 21:50:28.293589 systemd-resolved[1104]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 21:50:28.293608 systemd-resolved[1104]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 21:50:28.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:50:28.308779 systemd[1]: Started systemd-timesyncd.service. Feb 12 21:50:28.309093 systemd[1]: Reached target time-set.target. Feb 12 21:50:28.308000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 21:50:28.308000 audit[1121]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1d1a75e0 a2=420 a3=0 items=0 ppid=1101 pid=1121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:50:28.308000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 21:50:28.310281 augenrules[1121]: No rules Feb 12 21:50:28.310968 systemd[1]: Finished audit-rules.service. Feb 12 21:50:28.319308 systemd-resolved[1104]: Defaulting to hostname 'linux'. Feb 12 21:50:28.320410 systemd[1]: Started systemd-resolved.service. Feb 12 21:50:28.320554 systemd[1]: Reached target network.target. Feb 12 21:50:28.320643 systemd[1]: Reached target nss-lookup.target. Feb 12 21:51:13.149312 systemd-resolved[1104]: Clock change detected. Flushing caches. Feb 12 21:51:13.149394 systemd-timesyncd[1105]: Contacted time server 142.202.190.19:123 (0.flatcar.pool.ntp.org). Feb 12 21:51:13.149463 systemd-timesyncd[1105]: Initial clock synchronization to Mon 2024-02-12 21:51:13.149275 UTC. Feb 12 21:51:13.163566 ldconfig[1091]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 21:51:13.180934 systemd[1]: Finished ldconfig.service. Feb 12 21:51:13.182002 systemd[1]: Starting systemd-update-done.service... Feb 12 21:51:13.186324 systemd[1]: Finished systemd-update-done.service. Feb 12 21:51:13.186519 systemd[1]: Reached target sysinit.target. Feb 12 21:51:13.186664 systemd[1]: Started motdgen.path. Feb 12 21:51:13.186765 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 21:51:13.186948 systemd[1]: Started logrotate.timer. Feb 12 21:51:13.187084 systemd[1]: Started mdadm.timer. Feb 12 21:51:13.187165 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 21:51:13.187256 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 21:51:13.187275 systemd[1]: Reached target paths.target. Feb 12 21:51:13.187358 systemd[1]: Reached target timers.target. Feb 12 21:51:13.187627 systemd[1]: Listening on dbus.socket. Feb 12 21:51:13.188453 systemd[1]: Starting docker.socket... Feb 12 21:51:13.190772 systemd[1]: Listening on sshd.socket. Feb 12 21:51:13.190950 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:51:13.191213 systemd[1]: Listening on docker.socket. Feb 12 21:51:13.191340 systemd[1]: Reached target sockets.target. Feb 12 21:51:13.191425 systemd[1]: Reached target basic.target. Feb 12 21:51:13.191541 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 21:51:13.191560 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 21:51:13.192324 systemd[1]: Starting containerd.service... Feb 12 21:51:13.193303 systemd[1]: Starting dbus.service... Feb 12 21:51:13.194369 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 21:51:13.195516 systemd[1]: Starting extend-filesystems.service... Feb 12 21:51:13.196019 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 21:51:13.198155 jq[1132]: false Feb 12 21:51:13.196854 systemd[1]: Starting motdgen.service... Feb 12 21:51:13.198780 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 21:51:13.199851 systemd[1]: Starting prepare-critools.service... Feb 12 21:51:13.200813 systemd[1]: Starting prepare-helm.service... Feb 12 21:51:13.201914 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 21:51:13.202818 systemd[1]: Starting sshd-keygen.service... Feb 12 21:51:13.204998 systemd[1]: Starting systemd-logind.service... Feb 12 21:51:13.205137 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:51:13.205174 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 21:51:13.205946 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 21:51:13.206550 systemd[1]: Starting update-engine.service... Feb 12 21:51:13.208614 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 21:51:13.209735 systemd[1]: Starting vmtoolsd.service... Feb 12 21:51:13.211181 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 21:51:13.211559 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 21:51:13.217094 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 21:51:13.217216 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 21:51:13.226020 systemd[1]: Started vmtoolsd.service. Feb 12 21:51:13.229661 jq[1144]: true Feb 12 21:51:13.232982 jq[1159]: true Feb 12 21:51:13.240552 tar[1148]: ./ Feb 12 21:51:13.240552 tar[1148]: ./loopback Feb 12 21:51:13.240723 tar[1149]: crictl Feb 12 21:51:13.242966 tar[1150]: linux-amd64/helm Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda1 Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda2 Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda3 Feb 12 21:51:13.254390 extend-filesystems[1133]: Found usr Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda4 Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda6 Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda7 Feb 12 21:51:13.254390 extend-filesystems[1133]: Found sda9 Feb 12 21:51:13.254390 extend-filesystems[1133]: Checking size of /dev/sda9 Feb 12 21:51:13.259958 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 21:51:13.260057 systemd[1]: Finished motdgen.service. Feb 12 21:51:13.300333 env[1158]: time="2024-02-12T21:51:13.300293692Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 21:51:13.322677 tar[1148]: ./bandwidth Feb 12 21:51:13.329495 extend-filesystems[1133]: Old size kept for /dev/sda9 Feb 12 21:51:13.329495 extend-filesystems[1133]: Found sr0 Feb 12 21:51:13.327170 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 21:51:13.327266 systemd[1]: Finished extend-filesystems.service. Feb 12 21:51:13.339467 systemd-logind[1141]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 21:51:13.339481 systemd-logind[1141]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 21:51:13.340124 bash[1185]: Updated "/home/core/.ssh/authorized_keys" Feb 12 21:51:13.340521 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 21:51:13.341532 systemd-logind[1141]: New seat seat0. Feb 12 21:51:13.343400 env[1158]: time="2024-02-12T21:51:13.343376095Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 21:51:13.343751 env[1158]: time="2024-02-12T21:51:13.343739840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:51:13.347078 env[1158]: time="2024-02-12T21:51:13.347055380Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:51:13.347078 env[1158]: time="2024-02-12T21:51:13.347074051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347277753Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347288476Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347295988Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347301410Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347595322Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347718384Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347808190Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347817953Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347844301Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 21:51:13.348337 env[1158]: time="2024-02-12T21:51:13.347852330Z" level=info msg="metadata content store policy set" policy=shared Feb 12 21:51:13.354618 kernel: NET: Registered PF_VSOCK protocol family Feb 12 21:51:13.355148 dbus-daemon[1131]: [system] SELinux support is enabled Feb 12 21:51:13.355251 systemd[1]: Started dbus.service. Feb 12 21:51:13.356757 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 21:51:13.356780 systemd[1]: Reached target system-config.target. Feb 12 21:51:13.356919 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 21:51:13.356933 systemd[1]: Reached target user-config.target. Feb 12 21:51:13.361494 systemd[1]: Started systemd-logind.service. Feb 12 21:51:13.371926 env[1158]: time="2024-02-12T21:51:13.371894661Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 21:51:13.372289 env[1158]: time="2024-02-12T21:51:13.372274534Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 21:51:13.372355 env[1158]: time="2024-02-12T21:51:13.372341866Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 21:51:13.372422 env[1158]: time="2024-02-12T21:51:13.372410740Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.372475 env[1158]: time="2024-02-12T21:51:13.372462236Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.372535 env[1158]: time="2024-02-12T21:51:13.372514395Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.372583 env[1158]: time="2024-02-12T21:51:13.372573731Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.372649 env[1158]: time="2024-02-12T21:51:13.372623944Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.372874 env[1158]: time="2024-02-12T21:51:13.372862726Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.373417 env[1158]: time="2024-02-12T21:51:13.373402323Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.373475 env[1158]: time="2024-02-12T21:51:13.373464002Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.373522 env[1158]: time="2024-02-12T21:51:13.373512331Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 21:51:13.373640 env[1158]: time="2024-02-12T21:51:13.373630738Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 21:51:13.373729 env[1158]: time="2024-02-12T21:51:13.373720217Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 21:51:13.373915 env[1158]: time="2024-02-12T21:51:13.373903771Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 21:51:13.373973 env[1158]: time="2024-02-12T21:51:13.373963032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374023 env[1158]: time="2024-02-12T21:51:13.374012775Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 21:51:13.374109 env[1158]: time="2024-02-12T21:51:13.374100540Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374183 env[1158]: time="2024-02-12T21:51:13.374173861Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374230 env[1158]: time="2024-02-12T21:51:13.374220386Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374274 env[1158]: time="2024-02-12T21:51:13.374264783Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374324 env[1158]: time="2024-02-12T21:51:13.374313345Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374608 env[1158]: time="2024-02-12T21:51:13.374596631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374660 env[1158]: time="2024-02-12T21:51:13.374649393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374706 env[1158]: time="2024-02-12T21:51:13.374696165Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374759 env[1158]: time="2024-02-12T21:51:13.374749573Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 21:51:13.374871 env[1158]: time="2024-02-12T21:51:13.374861363Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374922 env[1158]: time="2024-02-12T21:51:13.374908243Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.374967 env[1158]: time="2024-02-12T21:51:13.374958130Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.375013 env[1158]: time="2024-02-12T21:51:13.375003957Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 21:51:13.375069 env[1158]: time="2024-02-12T21:51:13.375054017Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 21:51:13.375121 env[1158]: time="2024-02-12T21:51:13.375111702Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 21:51:13.375175 env[1158]: time="2024-02-12T21:51:13.375165277Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 21:51:13.375234 env[1158]: time="2024-02-12T21:51:13.375225136Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 21:51:13.375407 env[1158]: time="2024-02-12T21:51:13.375377856Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 21:51:13.378303 env[1158]: time="2024-02-12T21:51:13.377069410Z" level=info msg="Connect containerd service" Feb 12 21:51:13.378303 env[1158]: time="2024-02-12T21:51:13.377109834Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 21:51:13.378545 update_engine[1143]: I0212 21:51:13.376940 1143 main.cc:92] Flatcar Update Engine starting Feb 12 21:51:13.379509 systemd[1]: Started update-engine.service. Feb 12 21:51:13.379796 update_engine[1143]: I0212 21:51:13.379549 1143 update_check_scheduler.cc:74] Next update check in 3m10s Feb 12 21:51:13.381304 systemd[1]: Started locksmithd.service. Feb 12 21:51:13.381687 env[1158]: time="2024-02-12T21:51:13.381671011Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 21:51:13.381826 env[1158]: time="2024-02-12T21:51:13.381808692Z" level=info msg="Start subscribing containerd event" Feb 12 21:51:13.381998 env[1158]: time="2024-02-12T21:51:13.381987932Z" level=info msg="Start recovering state" Feb 12 21:51:13.382124 env[1158]: time="2024-02-12T21:51:13.382115084Z" level=info msg="Start event monitor" Feb 12 21:51:13.382175 env[1158]: time="2024-02-12T21:51:13.382165423Z" level=info msg="Start snapshots syncer" Feb 12 21:51:13.382217 env[1158]: time="2024-02-12T21:51:13.382208147Z" level=info msg="Start cni network conf syncer for default" Feb 12 21:51:13.382262 env[1158]: time="2024-02-12T21:51:13.382253480Z" level=info msg="Start streaming server" Feb 12 21:51:13.382464 env[1158]: time="2024-02-12T21:51:13.382454833Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 21:51:13.382611 env[1158]: time="2024-02-12T21:51:13.382601152Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 21:51:13.382700 env[1158]: time="2024-02-12T21:51:13.382692358Z" level=info msg="containerd successfully booted in 0.082777s" Feb 12 21:51:13.382733 systemd[1]: Started containerd.service. Feb 12 21:51:13.425624 systemd-networkd[1066]: ens192: Gained IPv6LL Feb 12 21:51:13.446663 tar[1148]: ./ptp Feb 12 21:51:13.523065 tar[1148]: ./vlan Feb 12 21:51:13.597368 tar[1148]: ./host-device Feb 12 21:51:13.657298 tar[1148]: ./tuning Feb 12 21:51:13.723725 tar[1148]: ./vrf Feb 12 21:51:13.740081 tar[1150]: linux-amd64/LICENSE Feb 12 21:51:13.740237 tar[1150]: linux-amd64/README.md Feb 12 21:51:13.743550 systemd[1]: Finished prepare-helm.service. Feb 12 21:51:13.772708 tar[1148]: ./sbr Feb 12 21:51:13.813693 tar[1148]: ./tap Feb 12 21:51:13.842459 tar[1148]: ./dhcp Feb 12 21:51:13.914124 tar[1148]: ./static Feb 12 21:51:13.933711 tar[1148]: ./firewall Feb 12 21:51:13.964061 tar[1148]: ./macvlan Feb 12 21:51:13.974386 systemd[1]: Finished prepare-critools.service. Feb 12 21:51:13.991342 tar[1148]: ./dummy Feb 12 21:51:14.016042 tar[1148]: ./bridge Feb 12 21:51:14.043407 tar[1148]: ./ipvlan Feb 12 21:51:14.068938 tar[1148]: ./portmap Feb 12 21:51:14.092466 tar[1148]: ./host-local Feb 12 21:51:14.130409 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 21:51:14.255675 locksmithd[1198]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 21:51:14.949363 sshd_keygen[1157]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 21:51:14.963344 systemd[1]: Finished sshd-keygen.service. Feb 12 21:51:14.964583 systemd[1]: Starting issuegen.service... Feb 12 21:51:14.968228 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 21:51:14.968314 systemd[1]: Finished issuegen.service. Feb 12 21:51:14.969353 systemd[1]: Starting systemd-user-sessions.service... Feb 12 21:51:14.973223 systemd[1]: Finished systemd-user-sessions.service. Feb 12 21:51:14.974041 systemd[1]: Started getty@tty1.service. Feb 12 21:51:14.974812 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 21:51:14.975009 systemd[1]: Reached target getty.target. Feb 12 21:51:14.975145 systemd[1]: Reached target multi-user.target. Feb 12 21:51:14.975989 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 21:51:14.980679 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 21:51:14.980764 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 21:51:14.980927 systemd[1]: Startup finished in 911ms (kernel) + 6.724s (initrd) + 7.039s (userspace) = 14.675s. Feb 12 21:51:15.000236 login[1267]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 21:51:15.000764 login[1266]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 21:51:15.007705 systemd[1]: Created slice user-500.slice. Feb 12 21:51:15.008450 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 21:51:15.010203 systemd-logind[1141]: New session 2 of user core. Feb 12 21:51:15.013913 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 21:51:15.014919 systemd[1]: Starting user@500.service... Feb 12 21:51:15.016990 (systemd)[1270]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:15.094707 systemd[1270]: Queued start job for default target default.target. Feb 12 21:51:15.095275 systemd[1270]: Reached target paths.target. Feb 12 21:51:15.095352 systemd[1270]: Reached target sockets.target. Feb 12 21:51:15.095454 systemd[1270]: Reached target timers.target. Feb 12 21:51:15.095543 systemd[1270]: Reached target basic.target. Feb 12 21:51:15.095632 systemd[1270]: Reached target default.target. Feb 12 21:51:15.095668 systemd[1]: Started user@500.service. Feb 12 21:51:15.095734 systemd[1270]: Startup finished in 75ms. Feb 12 21:51:15.096455 systemd[1]: Started session-2.scope. Feb 12 21:51:16.001557 login[1267]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 21:51:16.004485 systemd[1]: Started session-1.scope. Feb 12 21:51:16.004770 systemd-logind[1141]: New session 1 of user core. Feb 12 21:51:53.419596 systemd[1]: Created slice system-sshd.slice. Feb 12 21:51:53.420630 systemd[1]: Started sshd@0-139.178.70.106:22-139.178.89.65:60104.service. Feb 12 21:51:53.469932 sshd[1291]: Accepted publickey for core from 139.178.89.65 port 60104 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:53.470838 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:53.474361 systemd[1]: Started session-3.scope. Feb 12 21:51:53.475127 systemd-logind[1141]: New session 3 of user core. Feb 12 21:51:53.522558 systemd[1]: Started sshd@1-139.178.70.106:22-139.178.89.65:60106.service. Feb 12 21:51:53.564829 sshd[1296]: Accepted publickey for core from 139.178.89.65 port 60106 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:53.565774 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:53.568916 systemd-logind[1141]: New session 4 of user core. Feb 12 21:51:53.569379 systemd[1]: Started session-4.scope. Feb 12 21:51:53.624319 systemd[1]: Started sshd@2-139.178.70.106:22-139.178.89.65:60110.service. Feb 12 21:51:53.625447 sshd[1296]: pam_unix(sshd:session): session closed for user core Feb 12 21:51:53.628230 systemd-logind[1141]: Session 4 logged out. Waiting for processes to exit. Feb 12 21:51:53.628566 systemd[1]: sshd@1-139.178.70.106:22-139.178.89.65:60106.service: Deactivated successfully. Feb 12 21:51:53.629080 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 21:51:53.630059 systemd-logind[1141]: Removed session 4. Feb 12 21:51:53.655350 sshd[1301]: Accepted publickey for core from 139.178.89.65 port 60110 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:53.656382 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:53.659646 systemd[1]: Started session-5.scope. Feb 12 21:51:53.660284 systemd-logind[1141]: New session 5 of user core. Feb 12 21:51:53.708267 sshd[1301]: pam_unix(sshd:session): session closed for user core Feb 12 21:51:53.710442 systemd[1]: sshd@2-139.178.70.106:22-139.178.89.65:60110.service: Deactivated successfully. Feb 12 21:51:53.710817 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 21:51:53.711236 systemd-logind[1141]: Session 5 logged out. Waiting for processes to exit. Feb 12 21:51:53.711911 systemd[1]: Started sshd@3-139.178.70.106:22-139.178.89.65:60120.service. Feb 12 21:51:53.712432 systemd-logind[1141]: Removed session 5. Feb 12 21:51:53.741810 sshd[1308]: Accepted publickey for core from 139.178.89.65 port 60120 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:53.742839 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:53.745652 systemd-logind[1141]: New session 6 of user core. Feb 12 21:51:53.746019 systemd[1]: Started session-6.scope. Feb 12 21:51:53.797812 sshd[1308]: pam_unix(sshd:session): session closed for user core Feb 12 21:51:53.800237 systemd[1]: sshd@3-139.178.70.106:22-139.178.89.65:60120.service: Deactivated successfully. Feb 12 21:51:53.800670 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 21:51:53.801257 systemd-logind[1141]: Session 6 logged out. Waiting for processes to exit. Feb 12 21:51:53.802073 systemd[1]: Started sshd@4-139.178.70.106:22-139.178.89.65:60122.service. Feb 12 21:51:53.803038 systemd-logind[1141]: Removed session 6. Feb 12 21:51:53.832268 sshd[1314]: Accepted publickey for core from 139.178.89.65 port 60122 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:53.833061 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:53.835759 systemd-logind[1141]: New session 7 of user core. Feb 12 21:51:53.836243 systemd[1]: Started session-7.scope. Feb 12 21:51:53.897249 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 21:51:53.897386 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:51:53.902645 dbus-daemon[1131]: \xd0݅\u001e\xf3U: received setenforce notice (enforcing=-143302432) Feb 12 21:51:53.903653 sudo[1317]: pam_unix(sudo:session): session closed for user root Feb 12 21:51:53.905273 sshd[1314]: pam_unix(sshd:session): session closed for user core Feb 12 21:51:53.907665 systemd[1]: sshd@4-139.178.70.106:22-139.178.89.65:60122.service: Deactivated successfully. Feb 12 21:51:53.908052 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 21:51:53.908464 systemd-logind[1141]: Session 7 logged out. Waiting for processes to exit. Feb 12 21:51:53.909186 systemd[1]: Started sshd@5-139.178.70.106:22-139.178.89.65:60132.service. Feb 12 21:51:53.910624 systemd-logind[1141]: Removed session 7. Feb 12 21:51:53.938299 sshd[1321]: Accepted publickey for core from 139.178.89.65 port 60132 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:53.939098 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:53.941983 systemd[1]: Started session-8.scope. Feb 12 21:51:53.942632 systemd-logind[1141]: New session 8 of user core. Feb 12 21:51:53.991897 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 21:51:53.992053 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:51:53.994519 sudo[1325]: pam_unix(sudo:session): session closed for user root Feb 12 21:51:53.998015 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 21:51:53.998349 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:51:54.006314 systemd[1]: Stopping audit-rules.service... Feb 12 21:51:54.006000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 21:51:54.008235 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 21:51:54.008341 kernel: audit: type=1305 audit(1707774714.006:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 21:51:54.006000 audit[1328]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc2507190 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.015673 auditctl[1328]: No rules Feb 12 21:51:54.016247 kernel: audit: type=1300 audit(1707774714.006:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc2507190 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.016485 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 21:51:54.016660 systemd[1]: Stopped audit-rules.service. Feb 12 21:51:54.006000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 21:51:54.018043 systemd[1]: Starting audit-rules.service... Feb 12 21:51:54.022183 kernel: audit: type=1327 audit(1707774714.006:162): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 21:51:54.022221 kernel: audit: type=1131 audit(1707774714.016:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.031758 augenrules[1345]: No rules Feb 12 21:51:54.032358 systemd[1]: Finished audit-rules.service. Feb 12 21:51:54.045198 kernel: audit: type=1130 audit(1707774714.032:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.045256 kernel: audit: type=1106 audit(1707774714.032:165): pid=1324 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.045288 kernel: audit: type=1104 audit(1707774714.032:166): pid=1324 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.045305 kernel: audit: type=1130 audit(1707774714.035:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.106:22-139.178.89.65:60140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.032000 audit[1324]: USER_END pid=1324 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.032000 audit[1324]: CRED_DISP pid=1324 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.106:22-139.178.89.65:60140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.038765 systemd[1]: Started sshd@6-139.178.70.106:22-139.178.89.65:60140.service. Feb 12 21:51:54.032962 sudo[1324]: pam_unix(sudo:session): session closed for user root Feb 12 21:51:54.036046 sshd[1321]: pam_unix(sshd:session): session closed for user core Feb 12 21:51:54.045000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.047310 systemd[1]: sshd@5-139.178.70.106:22-139.178.89.65:60132.service: Deactivated successfully. Feb 12 21:51:54.047895 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 21:51:54.054237 kernel: audit: type=1106 audit(1707774714.045:168): pid=1321 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.054282 kernel: audit: type=1104 audit(1707774714.045:169): pid=1321 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.045000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.106:22-139.178.89.65:60132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.054496 systemd-logind[1141]: Session 8 logged out. Waiting for processes to exit. Feb 12 21:51:54.055205 systemd-logind[1141]: Removed session 8. Feb 12 21:51:54.072000 audit[1350]: USER_ACCT pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.073143 sshd[1350]: Accepted publickey for core from 139.178.89.65 port 60140 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:51:54.073000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.073000 audit[1350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7a2d040 a2=3 a3=0 items=0 ppid=1 pid=1350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.073000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:51:54.073861 sshd[1350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:51:54.076657 systemd[1]: Started session-9.scope. Feb 12 21:51:54.076850 systemd-logind[1141]: New session 9 of user core. Feb 12 21:51:54.079000 audit[1350]: USER_START pid=1350 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.079000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:51:54.125000 audit[1354]: USER_ACCT pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.125000 audit[1354]: CRED_REFR pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.125874 sudo[1354]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 21:51:54.126033 sudo[1354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:51:54.126000 audit[1354]: USER_START pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.637651 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 21:51:54.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.644563 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 21:51:54.644907 systemd[1]: Reached target network-online.target. Feb 12 21:51:54.646013 systemd[1]: Starting docker.service... Feb 12 21:51:54.669120 env[1370]: time="2024-02-12T21:51:54.669083067Z" level=info msg="Starting up" Feb 12 21:51:54.669855 env[1370]: time="2024-02-12T21:51:54.669838641Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 21:51:54.669855 env[1370]: time="2024-02-12T21:51:54.669849627Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 21:51:54.669933 env[1370]: time="2024-02-12T21:51:54.669860418Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 21:51:54.669933 env[1370]: time="2024-02-12T21:51:54.669866694Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 21:51:54.670936 env[1370]: time="2024-02-12T21:51:54.670922777Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 21:51:54.671000 env[1370]: time="2024-02-12T21:51:54.670988905Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 21:51:54.671064 env[1370]: time="2024-02-12T21:51:54.671051904Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 21:51:54.671113 env[1370]: time="2024-02-12T21:51:54.671100716Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 21:51:54.673903 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1859152397-merged.mount: Deactivated successfully. Feb 12 21:51:54.686267 env[1370]: time="2024-02-12T21:51:54.686239938Z" level=info msg="Loading containers: start." Feb 12 21:51:54.718000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.718000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe06c711d0 a2=0 a3=7ffe06c711bc items=0 ppid=1370 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.718000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 21:51:54.719000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.719000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce60dd440 a2=0 a3=7ffce60dd42c items=0 ppid=1370 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.719000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 21:51:54.721000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.721000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdf47b6770 a2=0 a3=7ffdf47b675c items=0 ppid=1370 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.721000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 21:51:54.722000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.722000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefb089060 a2=0 a3=7ffefb08904c items=0 ppid=1370 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 21:51:54.724000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.724000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc9832560 a2=0 a3=7fffc983254c items=0 ppid=1370 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 21:51:54.737000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.737000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef8f221b0 a2=0 a3=7ffef8f2219c items=0 ppid=1370 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 21:51:54.740000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.740000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc13710220 a2=0 a3=7ffc1371020c items=0 ppid=1370 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 21:51:54.741000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.741000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffcee8bee0 a2=0 a3=7fffcee8becc items=0 ppid=1370 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 21:51:54.742000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.742000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffced6ff960 a2=0 a3=7ffced6ff94c items=0 ppid=1370 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.742000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 21:51:54.746000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.746000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffdd886b10 a2=0 a3=7fffdd886afc items=0 ppid=1370 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 21:51:54.747000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.747000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffd4e19b70 a2=0 a3=7fffd4e19b5c items=0 ppid=1370 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 21:51:54.760542 kernel: Initializing XFRM netlink socket Feb 12 21:51:54.846545 env[1370]: time="2024-02-12T21:51:54.846506650Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 21:51:54.893000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.893000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffef36f31b0 a2=0 a3=7ffef36f319c items=0 ppid=1370 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 21:51:54.912000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.912000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffde24defa0 a2=0 a3=7ffde24def8c items=0 ppid=1370 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 21:51:54.914000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.914000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff1666bbb0 a2=0 a3=7fff1666bb9c items=0 ppid=1370 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 21:51:54.915000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.915000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe30b41220 a2=0 a3=7ffe30b4120c items=0 ppid=1370 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 21:51:54.916000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.916000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffef1db4ef0 a2=0 a3=7ffef1db4edc items=0 ppid=1370 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.916000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 21:51:54.917000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.917000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc9994f980 a2=0 a3=7ffc9994f96c items=0 ppid=1370 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 21:51:54.919000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.919000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffc54f9d40 a2=0 a3=7fffc54f9d2c items=0 ppid=1370 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 21:51:54.944000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.944000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff6e07b860 a2=0 a3=7fff6e07b84c items=0 ppid=1370 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 21:51:54.946000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.946000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe8a98ea90 a2=0 a3=7ffe8a98ea7c items=0 ppid=1370 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 21:51:54.948000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.948000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff80081230 a2=0 a3=7fff8008121c items=0 ppid=1370 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.948000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 21:51:54.950000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.950000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc066e1540 a2=0 a3=7ffc066e152c items=0 ppid=1370 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 21:51:54.951920 systemd-networkd[1066]: docker0: Link UP Feb 12 21:51:54.956000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.956000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef774d970 a2=0 a3=7ffef774d95c items=0 ppid=1370 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 21:51:54.957000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:51:54.957000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe3364dc40 a2=0 a3=7ffe3364dc2c items=0 ppid=1370 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:51:54.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 21:51:54.958328 env[1370]: time="2024-02-12T21:51:54.958299168Z" level=info msg="Loading containers: done." Feb 12 21:51:54.964876 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2202774700-merged.mount: Deactivated successfully. Feb 12 21:51:54.969773 env[1370]: time="2024-02-12T21:51:54.969753648Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 21:51:54.969987 env[1370]: time="2024-02-12T21:51:54.969974945Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 21:51:54.970097 env[1370]: time="2024-02-12T21:51:54.970087275Z" level=info msg="Daemon has completed initialization" Feb 12 21:51:54.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:54.978608 systemd[1]: Started docker.service. Feb 12 21:51:54.982891 env[1370]: time="2024-02-12T21:51:54.982855273Z" level=info msg="API listen on /run/docker.sock" Feb 12 21:51:54.994219 systemd[1]: Reloading. Feb 12 21:51:55.053658 /usr/lib/systemd/system-generators/torcx-generator[1508]: time="2024-02-12T21:51:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:51:55.053890 /usr/lib/systemd/system-generators/torcx-generator[1508]: time="2024-02-12T21:51:55Z" level=info msg="torcx already run" Feb 12 21:51:55.104746 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:51:55.104869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:51:55.117727 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit: BPF prog-id=31 op=LOAD Feb 12 21:51:55.153000 audit: BPF prog-id=26 op=UNLOAD Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.153000 audit: BPF prog-id=32 op=LOAD Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit: BPF prog-id=33 op=LOAD Feb 12 21:51:55.154000 audit: BPF prog-id=27 op=UNLOAD Feb 12 21:51:55.154000 audit: BPF prog-id=28 op=UNLOAD Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit: BPF prog-id=34 op=LOAD Feb 12 21:51:55.155000 audit: BPF prog-id=25 op=UNLOAD Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit: BPF prog-id=35 op=LOAD Feb 12 21:51:55.156000 audit: BPF prog-id=29 op=UNLOAD Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.156000 audit: BPF prog-id=36 op=LOAD Feb 12 21:51:55.156000 audit: BPF prog-id=15 op=UNLOAD Feb 12 21:51:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit: BPF prog-id=37 op=LOAD Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit: BPF prog-id=38 op=LOAD Feb 12 21:51:55.157000 audit: BPF prog-id=16 op=UNLOAD Feb 12 21:51:55.157000 audit: BPF prog-id=17 op=UNLOAD Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit: BPF prog-id=39 op=LOAD Feb 12 21:51:55.158000 audit: BPF prog-id=20 op=UNLOAD Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit: BPF prog-id=40 op=LOAD Feb 12 21:51:55.159000 audit: BPF prog-id=21 op=UNLOAD Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit: BPF prog-id=41 op=LOAD Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.159000 audit: BPF prog-id=42 op=LOAD Feb 12 21:51:55.160000 audit: BPF prog-id=22 op=UNLOAD Feb 12 21:51:55.160000 audit: BPF prog-id=23 op=UNLOAD Feb 12 21:51:55.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit: BPF prog-id=43 op=LOAD Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit: BPF prog-id=44 op=LOAD Feb 12 21:51:55.163000 audit: BPF prog-id=18 op=UNLOAD Feb 12 21:51:55.163000 audit: BPF prog-id=19 op=UNLOAD Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:51:55.163000 audit: BPF prog-id=45 op=LOAD Feb 12 21:51:55.163000 audit: BPF prog-id=24 op=UNLOAD Feb 12 21:51:55.176233 systemd[1]: Started kubelet.service. Feb 12 21:51:55.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:51:55.217135 kubelet[1567]: E0212 21:51:55.217096 1567 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 21:51:55.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 21:51:55.218413 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 21:51:55.218485 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 21:51:55.927671 env[1158]: time="2024-02-12T21:51:55.927617811Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 21:51:56.596658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1093261059.mount: Deactivated successfully. Feb 12 21:51:58.301538 env[1158]: time="2024-02-12T21:51:58.301485318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:51:58.303099 env[1158]: time="2024-02-12T21:51:58.303083985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:51:58.304026 env[1158]: time="2024-02-12T21:51:58.304008912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:51:58.304506 env[1158]: time="2024-02-12T21:51:58.304491079Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 12 21:51:58.305622 env[1158]: time="2024-02-12T21:51:58.305091921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:51:58.309629 update_engine[1143]: I0212 21:51:58.309568 1143 update_attempter.cc:509] Updating boot flags... Feb 12 21:51:58.313106 env[1158]: time="2024-02-12T21:51:58.313086820Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 21:52:00.366060 env[1158]: time="2024-02-12T21:52:00.366022910Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:00.378678 env[1158]: time="2024-02-12T21:52:00.378652163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:00.389219 env[1158]: time="2024-02-12T21:52:00.389176221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:00.398064 env[1158]: time="2024-02-12T21:52:00.398034565Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:00.398587 env[1158]: time="2024-02-12T21:52:00.398562437Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 12 21:52:00.405469 env[1158]: time="2024-02-12T21:52:00.405438682Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 21:52:01.846762 env[1158]: time="2024-02-12T21:52:01.846721958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:01.868464 env[1158]: time="2024-02-12T21:52:01.868437102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:01.890217 env[1158]: time="2024-02-12T21:52:01.890193056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:01.912265 env[1158]: time="2024-02-12T21:52:01.912210390Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:01.912480 env[1158]: time="2024-02-12T21:52:01.912457118Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 12 21:52:01.919466 env[1158]: time="2024-02-12T21:52:01.919446169Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 21:52:03.204138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3807349466.mount: Deactivated successfully. Feb 12 21:52:03.788109 env[1158]: time="2024-02-12T21:52:03.788067691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:03.803279 env[1158]: time="2024-02-12T21:52:03.803245909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:03.813213 env[1158]: time="2024-02-12T21:52:03.813184181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:03.824334 env[1158]: time="2024-02-12T21:52:03.824283623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:03.825768 env[1158]: time="2024-02-12T21:52:03.824638344Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 21:52:03.831749 env[1158]: time="2024-02-12T21:52:03.831718425Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 21:52:04.558304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount893736370.mount: Deactivated successfully. Feb 12 21:52:04.588202 env[1158]: time="2024-02-12T21:52:04.588171666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:04.596223 env[1158]: time="2024-02-12T21:52:04.596204681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:04.601641 env[1158]: time="2024-02-12T21:52:04.601589052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:04.607031 env[1158]: time="2024-02-12T21:52:04.607012781Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:04.607418 env[1158]: time="2024-02-12T21:52:04.607388590Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 21:52:04.615752 env[1158]: time="2024-02-12T21:52:04.615719273Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 21:52:05.279476 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 21:52:05.279611 systemd[1]: Stopped kubelet.service. Feb 12 21:52:05.281000 systemd[1]: Started kubelet.service. Feb 12 21:52:05.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:05.285303 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 21:52:05.285359 kernel: audit: type=1130 audit(1707774725.279:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:05.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:05.290299 kernel: audit: type=1131 audit(1707774725.279:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:05.290410 kernel: audit: type=1130 audit(1707774725.280:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:05.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:05.362230 kubelet[1627]: E0212 21:52:05.362200 1627 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 21:52:05.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 21:52:05.367606 kernel: audit: type=1131 audit(1707774725.364:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 21:52:05.364512 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 21:52:05.364601 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 21:52:05.436998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount869747340.mount: Deactivated successfully. Feb 12 21:52:09.749612 env[1158]: time="2024-02-12T21:52:09.749569418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:09.763548 env[1158]: time="2024-02-12T21:52:09.763508634Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:09.770321 env[1158]: time="2024-02-12T21:52:09.770303032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:09.775249 env[1158]: time="2024-02-12T21:52:09.775231321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:09.775705 env[1158]: time="2024-02-12T21:52:09.775687227Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 12 21:52:09.807591 env[1158]: time="2024-02-12T21:52:09.807566599Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 21:52:10.465425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3643427709.mount: Deactivated successfully. Feb 12 21:52:11.005000 env[1158]: time="2024-02-12T21:52:11.004969710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:11.005649 env[1158]: time="2024-02-12T21:52:11.005635607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:11.006443 env[1158]: time="2024-02-12T21:52:11.006430976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:11.007208 env[1158]: time="2024-02-12T21:52:11.007196265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:11.007568 env[1158]: time="2024-02-12T21:52:11.007554381Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 21:52:13.313068 systemd[1]: Stopped kubelet.service. Feb 12 21:52:13.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:13.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:13.318305 kernel: audit: type=1130 audit(1707774733.312:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:13.318339 kernel: audit: type=1131 audit(1707774733.312:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:13.327489 systemd[1]: Reloading. Feb 12 21:52:13.381238 /usr/lib/systemd/system-generators/torcx-generator[1727]: time="2024-02-12T21:52:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:52:13.381253 /usr/lib/systemd/system-generators/torcx-generator[1727]: time="2024-02-12T21:52:13Z" level=info msg="torcx already run" Feb 12 21:52:13.432431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:52:13.432445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:52:13.444876 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:52:13.485319 kernel: audit: type=1400 audit(1707774733.479:385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485380 kernel: audit: type=1400 audit(1707774733.479:386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.490142 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 21:52:13.490176 kernel: audit: type=1400 audit(1707774733.480:387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.490193 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.493353 kernel: audit: type=1400 audit(1707774733.480:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.493382 kernel: audit: backlog limit exceeded Feb 12 21:52:13.493399 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit: BPF prog-id=46 op=LOAD Feb 12 21:52:13.484000 audit: BPF prog-id=31 op=UNLOAD Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit: BPF prog-id=47 op=LOAD Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.484000 audit: BPF prog-id=48 op=LOAD Feb 12 21:52:13.484000 audit: BPF prog-id=32 op=UNLOAD Feb 12 21:52:13.484000 audit: BPF prog-id=33 op=UNLOAD Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit: BPF prog-id=49 op=LOAD Feb 12 21:52:13.485000 audit: BPF prog-id=34 op=UNLOAD Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit: BPF prog-id=50 op=LOAD Feb 12 21:52:13.486000 audit: BPF prog-id=35 op=UNLOAD Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.490000 audit: BPF prog-id=51 op=LOAD Feb 12 21:52:13.490000 audit: BPF prog-id=36 op=UNLOAD Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit: BPF prog-id=52 op=LOAD Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit: BPF prog-id=53 op=LOAD Feb 12 21:52:13.494000 audit: BPF prog-id=37 op=UNLOAD Feb 12 21:52:13.494000 audit: BPF prog-id=38 op=UNLOAD Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.494000 audit: BPF prog-id=54 op=LOAD Feb 12 21:52:13.494000 audit: BPF prog-id=39 op=UNLOAD Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit: BPF prog-id=55 op=LOAD Feb 12 21:52:13.495000 audit: BPF prog-id=40 op=UNLOAD Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit: BPF prog-id=56 op=LOAD Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.495000 audit: BPF prog-id=57 op=LOAD Feb 12 21:52:13.495000 audit: BPF prog-id=41 op=UNLOAD Feb 12 21:52:13.495000 audit: BPF prog-id=42 op=UNLOAD Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit: BPF prog-id=58 op=LOAD Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit: BPF prog-id=59 op=LOAD Feb 12 21:52:13.496000 audit: BPF prog-id=43 op=UNLOAD Feb 12 21:52:13.496000 audit: BPF prog-id=44 op=UNLOAD Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.497000 audit: BPF prog-id=60 op=LOAD Feb 12 21:52:13.497000 audit: BPF prog-id=45 op=UNLOAD Feb 12 21:52:13.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:13.507105 systemd[1]: Started kubelet.service. Feb 12 21:52:13.541493 kubelet[1787]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 21:52:13.541707 kubelet[1787]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 21:52:13.541750 kubelet[1787]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 21:52:13.541839 kubelet[1787]: I0212 21:52:13.541821 1787 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 21:52:13.760546 kubelet[1787]: I0212 21:52:13.758074 1787 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 21:52:13.760674 kubelet[1787]: I0212 21:52:13.760665 1787 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 21:52:13.760876 kubelet[1787]: I0212 21:52:13.760868 1787 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 21:52:13.782505 kubelet[1787]: E0212 21:52:13.782490 1787 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.106:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.782571 kubelet[1787]: I0212 21:52:13.782520 1787 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 21:52:13.784317 kubelet[1787]: I0212 21:52:13.784307 1787 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 21:52:13.784554 kubelet[1787]: I0212 21:52:13.784544 1787 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 21:52:13.784675 kubelet[1787]: I0212 21:52:13.784663 1787 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 21:52:13.784811 kubelet[1787]: I0212 21:52:13.784802 1787 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 21:52:13.784862 kubelet[1787]: I0212 21:52:13.784855 1787 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 21:52:13.784977 kubelet[1787]: I0212 21:52:13.784968 1787 state_mem.go:36] "Initialized new in-memory state store" Feb 12 21:52:13.788738 kubelet[1787]: I0212 21:52:13.788715 1787 kubelet.go:405] "Attempting to sync node with API server" Feb 12 21:52:13.788738 kubelet[1787]: I0212 21:52:13.788732 1787 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 21:52:13.788808 kubelet[1787]: I0212 21:52:13.788745 1787 kubelet.go:309] "Adding apiserver pod source" Feb 12 21:52:13.788808 kubelet[1787]: I0212 21:52:13.788754 1787 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 21:52:13.789636 kubelet[1787]: I0212 21:52:13.789625 1787 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 21:52:13.789789 kubelet[1787]: W0212 21:52:13.789778 1787 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 21:52:13.790029 kubelet[1787]: I0212 21:52:13.790018 1787 server.go:1168] "Started kubelet" Feb 12 21:52:13.790109 kubelet[1787]: W0212 21:52:13.790083 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.106:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.790142 kubelet[1787]: E0212 21:52:13.790117 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.106:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.790163 kubelet[1787]: W0212 21:52:13.790148 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.106:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.790183 kubelet[1787]: E0212 21:52:13.790163 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.106:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.793000 audit[1787]: AVC avc: denied { mac_admin } for pid=1787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.793000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:52:13.793000 audit[1787]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc28a0 a1=c00092fda0 a2=c000bc2870 a3=25 items=0 ppid=1 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.793000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:52:13.793000 audit[1787]: AVC avc: denied { mac_admin } for pid=1787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.793000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:52:13.793000 audit[1787]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb45e0 a1=c00092fdb8 a2=c000bc2930 a3=25 items=0 ppid=1 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.793000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:52:13.794081 kubelet[1787]: I0212 21:52:13.793807 1787 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 21:52:13.794081 kubelet[1787]: I0212 21:52:13.793847 1787 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 21:52:13.794081 kubelet[1787]: I0212 21:52:13.793895 1787 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 21:52:13.794710 kubelet[1787]: E0212 21:52:13.794701 1787 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 21:52:13.794764 kubelet[1787]: E0212 21:52:13.794757 1787 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 21:52:13.795000 audit[1798]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.795000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd78f50620 a2=0 a3=7ffd78f5060c items=0 ppid=1787 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 21:52:13.796666 kubelet[1787]: I0212 21:52:13.796658 1787 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 21:52:13.796000 audit[1799]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.796000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe33ba61d0 a2=0 a3=7ffe33ba61bc items=0 ppid=1787 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 21:52:13.797214 kubelet[1787]: I0212 21:52:13.797206 1787 server.go:461] "Adding debug handlers to kubelet server" Feb 12 21:52:13.797502 kubelet[1787]: I0212 21:52:13.797489 1787 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 21:52:13.797897 kubelet[1787]: I0212 21:52:13.797889 1787 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 21:52:13.797000 audit[1801]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.797000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff5bfc6870 a2=0 a3=7fff5bfc685c items=0 ppid=1787 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:52:13.798693 kubelet[1787]: E0212 21:52:13.798642 1787 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33c127bf0bf3d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 52, 13, 790003005, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 52, 13, 790003005, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.70.106:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.106:6443: connect: connection refused'(may retry after sleeping) Feb 12 21:52:13.798839 kubelet[1787]: E0212 21:52:13.798830 1787 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.106:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.106:6443: connect: connection refused" interval="200ms" Feb 12 21:52:13.799109 kubelet[1787]: I0212 21:52:13.799096 1787 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 21:52:13.799869 kubelet[1787]: W0212 21:52:13.799846 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.106:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.799908 kubelet[1787]: E0212 21:52:13.799872 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.106:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.804000 audit[1803]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.804000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc83a72d40 a2=0 a3=7ffc83a72d2c items=0 ppid=1787 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:52:13.821209 kubelet[1787]: I0212 21:52:13.821195 1787 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 21:52:13.821209 kubelet[1787]: I0212 21:52:13.821206 1787 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 21:52:13.821281 kubelet[1787]: I0212 21:52:13.821217 1787 state_mem.go:36] "Initialized new in-memory state store" Feb 12 21:52:13.829074 kubelet[1787]: I0212 21:52:13.829059 1787 policy_none.go:49] "None policy: Start" Feb 12 21:52:13.829453 kubelet[1787]: I0212 21:52:13.829445 1787 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 21:52:13.829580 kubelet[1787]: I0212 21:52:13.829573 1787 state_mem.go:35] "Initializing new in-memory state store" Feb 12 21:52:13.835679 systemd[1]: Created slice kubepods.slice. Feb 12 21:52:13.836000 audit[1808]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.836000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe9dedf8f0 a2=0 a3=7ffe9dedf8dc items=0 ppid=1787 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 21:52:13.838114 kubelet[1787]: I0212 21:52:13.838105 1787 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 21:52:13.839000 audit[1810]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.839000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7c73bbd0 a2=0 a3=7fff7c73bbbc items=0 ppid=1787 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 21:52:13.840000 audit[1809]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:13.840000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca5764a90 a2=0 a3=7ffca5764a7c items=0 ppid=1787 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 21:52:13.840880 kubelet[1787]: I0212 21:52:13.840799 1787 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 21:52:13.840880 kubelet[1787]: I0212 21:52:13.840814 1787 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 21:52:13.840880 kubelet[1787]: I0212 21:52:13.840826 1787 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 21:52:13.840880 kubelet[1787]: E0212 21:52:13.840854 1787 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 21:52:13.840000 audit[1811]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:13.840000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe64938920 a2=0 a3=7ffe6493890c items=0 ppid=1787 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 21:52:13.842819 kubelet[1787]: W0212 21:52:13.842681 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.106:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.842819 kubelet[1787]: E0212 21:52:13.842699 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.106:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:13.843783 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 21:52:13.843000 audit[1814]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.843000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2b358400 a2=0 a3=7ffc2b3583ec items=0 ppid=1787 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.843000 audit[1813]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:13.843000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe7b549bc0 a2=0 a3=7ffe7b549bac items=0 ppid=1787 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 21:52:13.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 21:52:13.844000 audit[1815]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:13.844000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2bdc1c50 a2=0 a3=7ffe2bdc1c3c items=0 ppid=1787 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.844000 audit[1816]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:13.844000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe74350fb0 a2=0 a3=7ffe74350f9c items=0 ppid=1787 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 21:52:13.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 21:52:13.846708 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 21:52:13.851910 kubelet[1787]: I0212 21:52:13.851899 1787 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 21:52:13.851000 audit[1787]: AVC avc: denied { mac_admin } for pid=1787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:13.851000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:52:13.851000 audit[1787]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e3a360 a1=c000b91a28 a2=c000e3a330 a3=25 items=0 ppid=1 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:13.851000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:52:13.852185 kubelet[1787]: I0212 21:52:13.852169 1787 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 21:52:13.852329 kubelet[1787]: I0212 21:52:13.852322 1787 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 21:52:13.853171 kubelet[1787]: E0212 21:52:13.853162 1787 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 21:52:13.898823 kubelet[1787]: I0212 21:52:13.898813 1787 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 21:52:13.899110 kubelet[1787]: E0212 21:52:13.899093 1787 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.106:6443/api/v1/nodes\": dial tcp 139.178.70.106:6443: connect: connection refused" node="localhost" Feb 12 21:52:13.941343 kubelet[1787]: I0212 21:52:13.941312 1787 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:13.942197 kubelet[1787]: I0212 21:52:13.942182 1787 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:13.942810 kubelet[1787]: I0212 21:52:13.942798 1787 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:13.945921 systemd[1]: Created slice kubepods-burstable-pod29e5a6a3c5a22dd7a6d17d3f5b797ebb.slice. Feb 12 21:52:13.951948 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 12 21:52:13.957835 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 12 21:52:13.999497 kubelet[1787]: E0212 21:52:13.999475 1787 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.106:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.106:6443: connect: connection refused" interval="400ms" Feb 12 21:52:14.100582 kubelet[1787]: I0212 21:52:14.100561 1787 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 21:52:14.100788 kubelet[1787]: I0212 21:52:14.100774 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/29e5a6a3c5a22dd7a6d17d3f5b797ebb-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"29e5a6a3c5a22dd7a6d17d3f5b797ebb\") " pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:14.100832 kubelet[1787]: I0212 21:52:14.100793 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/29e5a6a3c5a22dd7a6d17d3f5b797ebb-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"29e5a6a3c5a22dd7a6d17d3f5b797ebb\") " pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:14.100832 kubelet[1787]: I0212 21:52:14.100806 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/29e5a6a3c5a22dd7a6d17d3f5b797ebb-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"29e5a6a3c5a22dd7a6d17d3f5b797ebb\") " pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:14.100832 kubelet[1787]: I0212 21:52:14.100819 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:14.100889 kubelet[1787]: I0212 21:52:14.100832 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:14.100889 kubelet[1787]: I0212 21:52:14.100850 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 21:52:14.100889 kubelet[1787]: I0212 21:52:14.100861 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:14.100889 kubelet[1787]: I0212 21:52:14.100872 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:14.100889 kubelet[1787]: I0212 21:52:14.100883 1787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:14.100999 kubelet[1787]: E0212 21:52:14.100938 1787 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.106:6443/api/v1/nodes\": dial tcp 139.178.70.106:6443: connect: connection refused" node="localhost" Feb 12 21:52:14.252329 env[1158]: time="2024-02-12T21:52:14.252131181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:29e5a6a3c5a22dd7a6d17d3f5b797ebb,Namespace:kube-system,Attempt:0,}" Feb 12 21:52:14.253751 env[1158]: time="2024-02-12T21:52:14.253705193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 12 21:52:14.259609 env[1158]: time="2024-02-12T21:52:14.259473396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 12 21:52:14.400779 kubelet[1787]: E0212 21:52:14.400717 1787 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.106:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.106:6443: connect: connection refused" interval="800ms" Feb 12 21:52:14.501832 kubelet[1787]: I0212 21:52:14.501817 1787 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 21:52:14.502135 kubelet[1787]: E0212 21:52:14.502127 1787 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.106:6443/api/v1/nodes\": dial tcp 139.178.70.106:6443: connect: connection refused" node="localhost" Feb 12 21:52:14.719063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4146633462.mount: Deactivated successfully. Feb 12 21:52:14.721446 env[1158]: time="2024-02-12T21:52:14.721422789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.722779 env[1158]: time="2024-02-12T21:52:14.722766935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.723797 env[1158]: time="2024-02-12T21:52:14.723784407Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.724967 env[1158]: time="2024-02-12T21:52:14.724948227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.725899 env[1158]: time="2024-02-12T21:52:14.725887754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.726957 env[1158]: time="2024-02-12T21:52:14.726941213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.729720 env[1158]: time="2024-02-12T21:52:14.729707972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.734098 env[1158]: time="2024-02-12T21:52:14.734023456Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.738341 env[1158]: time="2024-02-12T21:52:14.738317887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.740713 env[1158]: time="2024-02-12T21:52:14.740689320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.741947 env[1158]: time="2024-02-12T21:52:14.741933735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.742403 env[1158]: time="2024-02-12T21:52:14.742390847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:14.745285 env[1158]: time="2024-02-12T21:52:14.745162952Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:14.745285 env[1158]: time="2024-02-12T21:52:14.745277772Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:14.745412 env[1158]: time="2024-02-12T21:52:14.745302663Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:14.745901 env[1158]: time="2024-02-12T21:52:14.745863789Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a84b223d3b0f5aa017fbf13a730b48356fac9f4bc2dd6388c7b05fd6d79e0c19 pid=1825 runtime=io.containerd.runc.v2 Feb 12 21:52:14.751843 kubelet[1787]: W0212 21:52:14.751820 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.106:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:14.752012 kubelet[1787]: E0212 21:52:14.751846 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.106:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:14.763716 systemd[1]: Started cri-containerd-a84b223d3b0f5aa017fbf13a730b48356fac9f4bc2dd6388c7b05fd6d79e0c19.scope. Feb 12 21:52:14.771469 env[1158]: time="2024-02-12T21:52:14.771379015Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:14.771469 env[1158]: time="2024-02-12T21:52:14.771414243Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:14.771469 env[1158]: time="2024-02-12T21:52:14.771428013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:14.771614 env[1158]: time="2024-02-12T21:52:14.771508112Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a81020f073bc7d44f25bd0693e4e9f74bf032a633f44704781d6bea381bacff5 pid=1854 runtime=io.containerd.runc.v2 Feb 12 21:52:14.775024 env[1158]: time="2024-02-12T21:52:14.774915434Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:14.775024 env[1158]: time="2024-02-12T21:52:14.774958214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:14.775024 env[1158]: time="2024-02-12T21:52:14.774965318Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:14.775208 env[1158]: time="2024-02-12T21:52:14.775176094Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4368c3b5055c2fb2e72bb38c7fdcf9cf266f860bbdb2cad83fc82c18d35967b0 pid=1852 runtime=io.containerd.runc.v2 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit: BPF prog-id=61 op=LOAD Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1825 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138346232323364336230663561613031376662663133613733306234 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1825 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138346232323364336230663561613031376662663133613733306234 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit: BPF prog-id=62 op=LOAD Feb 12 21:52:14.778000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca8a0 items=0 ppid=1825 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138346232323364336230663561613031376662663133613733306234 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit: BPF prog-id=63 op=LOAD Feb 12 21:52:14.778000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca8e8 items=0 ppid=1825 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138346232323364336230663561613031376662663133613733306234 Feb 12 21:52:14.778000 audit: BPF prog-id=63 op=UNLOAD Feb 12 21:52:14.778000 audit: BPF prog-id=62 op=UNLOAD Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.778000 audit: BPF prog-id=64 op=LOAD Feb 12 21:52:14.778000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cacf8 items=0 ppid=1825 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138346232323364336230663561613031376662663133613733306234 Feb 12 21:52:14.785162 systemd[1]: Started cri-containerd-a81020f073bc7d44f25bd0693e4e9f74bf032a633f44704781d6bea381bacff5.scope. Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.795000 audit: BPF prog-id=65 op=LOAD Feb 12 21:52:14.797401 systemd[1]: Started cri-containerd-4368c3b5055c2fb2e72bb38c7fdcf9cf266f860bbdb2cad83fc82c18d35967b0.scope. Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1854 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032306630373362633764343466323562643036393365346539 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1854 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032306630373362633764343466323562643036393365346539 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit: BPF prog-id=66 op=LOAD Feb 12 21:52:14.800000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000388350 items=0 ppid=1854 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032306630373362633764343466323562643036393365346539 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit: BPF prog-id=67 op=LOAD Feb 12 21:52:14.800000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000388398 items=0 ppid=1854 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032306630373362633764343466323562643036393365346539 Feb 12 21:52:14.800000 audit: BPF prog-id=67 op=UNLOAD Feb 12 21:52:14.800000 audit: BPF prog-id=66 op=UNLOAD Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.800000 audit: BPF prog-id=68 op=LOAD Feb 12 21:52:14.800000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003887a8 items=0 ppid=1854 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032306630373362633764343466323562643036393365346539 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.816000 audit: BPF prog-id=69 op=LOAD Feb 12 21:52:14.817848 env[1158]: time="2024-02-12T21:52:14.817811275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:29e5a6a3c5a22dd7a6d17d3f5b797ebb,Namespace:kube-system,Attempt:0,} returns sandbox id \"a84b223d3b0f5aa017fbf13a730b48356fac9f4bc2dd6388c7b05fd6d79e0c19\"" Feb 12 21:52:14.819807 env[1158]: time="2024-02-12T21:52:14.819787054Z" level=info msg="CreateContainer within sandbox \"a84b223d3b0f5aa017fbf13a730b48356fac9f4bc2dd6388c7b05fd6d79e0c19\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1852 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363863336235303535633266623265373262623338633766646366 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1852 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363863336235303535633266623265373262623338633766646366 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit: BPF prog-id=70 op=LOAD Feb 12 21:52:14.819000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b8e0 items=0 ppid=1852 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363863336235303535633266623265373262623338633766646366 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit: BPF prog-id=71 op=LOAD Feb 12 21:52:14.819000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b928 items=0 ppid=1852 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363863336235303535633266623265373262623338633766646366 Feb 12 21:52:14.819000 audit: BPF prog-id=71 op=UNLOAD Feb 12 21:52:14.819000 audit: BPF prog-id=70 op=UNLOAD Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.819000 audit: BPF prog-id=72 op=LOAD Feb 12 21:52:14.819000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028bd38 items=0 ppid=1852 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363863336235303535633266623265373262623338633766646366 Feb 12 21:52:14.835829 env[1158]: time="2024-02-12T21:52:14.835796521Z" level=info msg="CreateContainer within sandbox \"a84b223d3b0f5aa017fbf13a730b48356fac9f4bc2dd6388c7b05fd6d79e0c19\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"58aaae59f94ff950bfb7c6623e57dc2553160a4e5d4d02947e19707ffaf3ca25\"" Feb 12 21:52:14.837611 env[1158]: time="2024-02-12T21:52:14.837586433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"a81020f073bc7d44f25bd0693e4e9f74bf032a633f44704781d6bea381bacff5\"" Feb 12 21:52:14.837958 env[1158]: time="2024-02-12T21:52:14.837941481Z" level=info msg="StartContainer for \"58aaae59f94ff950bfb7c6623e57dc2553160a4e5d4d02947e19707ffaf3ca25\"" Feb 12 21:52:14.839321 env[1158]: time="2024-02-12T21:52:14.839299764Z" level=info msg="CreateContainer within sandbox \"a81020f073bc7d44f25bd0693e4e9f74bf032a633f44704781d6bea381bacff5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 21:52:14.859738 env[1158]: time="2024-02-12T21:52:14.859674300Z" level=info msg="CreateContainer within sandbox \"a81020f073bc7d44f25bd0693e4e9f74bf032a633f44704781d6bea381bacff5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"860b9293d39c6442ba76826ec265d6529f485c30173e3708ea94c2a7958d4981\"" Feb 12 21:52:14.860605 systemd[1]: Started cri-containerd-58aaae59f94ff950bfb7c6623e57dc2553160a4e5d4d02947e19707ffaf3ca25.scope. Feb 12 21:52:14.861798 env[1158]: time="2024-02-12T21:52:14.861775121Z" level=info msg="StartContainer for \"860b9293d39c6442ba76826ec265d6529f485c30173e3708ea94c2a7958d4981\"" Feb 12 21:52:14.863316 env[1158]: time="2024-02-12T21:52:14.863296508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"4368c3b5055c2fb2e72bb38c7fdcf9cf266f860bbdb2cad83fc82c18d35967b0\"" Feb 12 21:52:14.864483 env[1158]: time="2024-02-12T21:52:14.864459748Z" level=info msg="CreateContainer within sandbox \"4368c3b5055c2fb2e72bb38c7fdcf9cf266f860bbdb2cad83fc82c18d35967b0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit: BPF prog-id=73 op=LOAD Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1825 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616161653539663934666639353062666237633636323365353764 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1825 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616161653539663934666639353062666237633636323365353764 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit: BPF prog-id=74 op=LOAD Feb 12 21:52:14.870000 audit[1943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000213620 items=0 ppid=1825 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616161653539663934666639353062666237633636323365353764 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit: BPF prog-id=75 op=LOAD Feb 12 21:52:14.870000 audit[1943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000213668 items=0 ppid=1825 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616161653539663934666639353062666237633636323365353764 Feb 12 21:52:14.870000 audit: BPF prog-id=75 op=UNLOAD Feb 12 21:52:14.870000 audit: BPF prog-id=74 op=UNLOAD Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { perfmon } for pid=1943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit[1943]: AVC avc: denied { bpf } for pid=1943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.870000 audit: BPF prog-id=76 op=LOAD Feb 12 21:52:14.870000 audit[1943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000213a78 items=0 ppid=1825 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616161653539663934666639353062666237633636323365353764 Feb 12 21:52:14.879468 systemd[1]: Started cri-containerd-860b9293d39c6442ba76826ec265d6529f485c30173e3708ea94c2a7958d4981.scope. Feb 12 21:52:14.885346 env[1158]: time="2024-02-12T21:52:14.885314149Z" level=info msg="CreateContainer within sandbox \"4368c3b5055c2fb2e72bb38c7fdcf9cf266f860bbdb2cad83fc82c18d35967b0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e6f0002236cf8ce38a590727079dd95a404ea08fbfe3df2ce714163c3ce7506b\"" Feb 12 21:52:14.885684 env[1158]: time="2024-02-12T21:52:14.885666164Z" level=info msg="StartContainer for \"e6f0002236cf8ce38a590727079dd95a404ea08fbfe3df2ce714163c3ce7506b\"" Feb 12 21:52:14.897002 systemd[1]: Started cri-containerd-e6f0002236cf8ce38a590727079dd95a404ea08fbfe3df2ce714163c3ce7506b.scope. Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.901000 audit: BPF prog-id=77 op=LOAD Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1854 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306239323933643339633634343262613736383236656332363564 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1854 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306239323933643339633634343262613736383236656332363564 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit: BPF prog-id=78 op=LOAD Feb 12 21:52:14.907000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000245f00 items=0 ppid=1854 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306239323933643339633634343262613736383236656332363564 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit: BPF prog-id=79 op=LOAD Feb 12 21:52:14.907000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000245f48 items=0 ppid=1854 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306239323933643339633634343262613736383236656332363564 Feb 12 21:52:14.907000 audit: BPF prog-id=79 op=UNLOAD Feb 12 21:52:14.907000 audit: BPF prog-id=78 op=UNLOAD Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.907000 audit: BPF prog-id=80 op=LOAD Feb 12 21:52:14.907000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a4358 items=0 ppid=1854 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306239323933643339633634343262613736383236656332363564 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.918000 audit: BPF prog-id=81 op=LOAD Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1852 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663030303232333663663863653338613539303732373037396464 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1852 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663030303232333663663863653338613539303732373037396464 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit: BPF prog-id=82 op=LOAD Feb 12 21:52:14.919000 audit[1995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383dc0 items=0 ppid=1852 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663030303232333663663863653338613539303732373037396464 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit: BPF prog-id=83 op=LOAD Feb 12 21:52:14.919000 audit[1995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383e08 items=0 ppid=1852 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663030303232333663663863653338613539303732373037396464 Feb 12 21:52:14.919000 audit: BPF prog-id=83 op=UNLOAD Feb 12 21:52:14.919000 audit: BPF prog-id=82 op=UNLOAD Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:14.919000 audit: BPF prog-id=84 op=LOAD Feb 12 21:52:14.919000 audit[1995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f4218 items=0 ppid=1852 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663030303232333663663863653338613539303732373037396464 Feb 12 21:52:14.927189 env[1158]: time="2024-02-12T21:52:14.927156027Z" level=info msg="StartContainer for \"58aaae59f94ff950bfb7c6623e57dc2553160a4e5d4d02947e19707ffaf3ca25\" returns successfully" Feb 12 21:52:14.949786 env[1158]: time="2024-02-12T21:52:14.949071831Z" level=info msg="StartContainer for \"860b9293d39c6442ba76826ec265d6529f485c30173e3708ea94c2a7958d4981\" returns successfully" Feb 12 21:52:14.958251 env[1158]: time="2024-02-12T21:52:14.958216773Z" level=info msg="StartContainer for \"e6f0002236cf8ce38a590727079dd95a404ea08fbfe3df2ce714163c3ce7506b\" returns successfully" Feb 12 21:52:15.168828 kubelet[1787]: W0212 21:52:15.168788 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.106:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:15.168828 kubelet[1787]: E0212 21:52:15.168829 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.106:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:15.181206 kubelet[1787]: W0212 21:52:15.181167 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.106:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:15.181206 kubelet[1787]: E0212 21:52:15.181206 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.106:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:15.201777 kubelet[1787]: E0212 21:52:15.201748 1787 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.106:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.106:6443: connect: connection refused" interval="1.6s" Feb 12 21:52:15.303280 kubelet[1787]: I0212 21:52:15.303134 1787 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 21:52:15.303376 kubelet[1787]: E0212 21:52:15.303321 1787 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.106:6443/api/v1/nodes\": dial tcp 139.178.70.106:6443: connect: connection refused" node="localhost" Feb 12 21:52:15.329952 kubelet[1787]: W0212 21:52:15.329891 1787 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.106:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:15.329952 kubelet[1787]: E0212 21:52:15.329930 1787 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.106:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:15.874413 kubelet[1787]: E0212 21:52:15.874392 1787 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.106:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.106:6443: connect: connection refused Feb 12 21:52:16.173000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.173000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000872000 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:16.173000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:16.174000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.174000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00085c040 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:16.174000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:16.904135 kubelet[1787]: I0212 21:52:16.904115 1787 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 21:52:16.914000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.914000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.914000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0043488a0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:52:16.914000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:52:16.914000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0045438f0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:52:16.914000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:52:16.914000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.914000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c009b92040 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:52:16.914000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:52:16.930000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.930000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0051c0870 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:52:16.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:52:16.978000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.978000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c003faf0e0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:52:16.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:52:16.978000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:16.978000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c003b16450 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:52:16.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:52:17.007464 kubelet[1787]: E0212 21:52:17.007420 1787 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 12 21:52:17.074757 kubelet[1787]: I0212 21:52:17.074730 1787 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 21:52:17.080109 kubelet[1787]: E0212 21:52:17.080089 1787 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 21:52:17.180641 kubelet[1787]: E0212 21:52:17.180569 1787 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 21:52:17.281125 kubelet[1787]: E0212 21:52:17.281053 1787 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 21:52:17.381771 kubelet[1787]: E0212 21:52:17.381736 1787 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 21:52:17.792856 kubelet[1787]: I0212 21:52:17.792841 1787 apiserver.go:52] "Watching apiserver" Feb 12 21:52:17.799651 kubelet[1787]: I0212 21:52:17.799633 1787 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 21:52:17.819821 kubelet[1787]: I0212 21:52:17.819789 1787 reconciler.go:41] "Reconciler: start to sync state" Feb 12 21:52:17.859480 kubelet[1787]: E0212 21:52:17.859462 1787 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:19.270898 kernel: kauditd_printk_skb: 583 callbacks suppressed Feb 12 21:52:19.270988 kernel: audit: type=1400 audit(1707774739.266:687): avc: denied { watch } for pid=1992 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 21:52:19.266000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 21:52:19.275449 kernel: audit: type=1300 audit(1707774739.266:687): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ebbb00 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:19.266000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ebbb00 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:19.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:19.279542 kernel: audit: type=1327 audit(1707774739.266:687): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:19.630875 systemd[1]: Reloading. Feb 12 21:52:19.690842 /usr/lib/systemd/system-generators/torcx-generator[2079]: time="2024-02-12T21:52:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:52:19.691071 /usr/lib/systemd/system-generators/torcx-generator[2079]: time="2024-02-12T21:52:19Z" level=info msg="torcx already run" Feb 12 21:52:19.757339 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:52:19.757464 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:52:19.770541 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:52:19.827391 kernel: audit: type=1400 audit(1707774739.822:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827455 kernel: audit: type=1400 audit(1707774739.822:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832629 kernel: audit: type=1400 audit(1707774739.827:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832659 kernel: audit: type=1400 audit(1707774739.827:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835223 kernel: audit: type=1400 audit(1707774739.827:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837790 kernel: audit: type=1400 audit(1707774739.827:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840318 kernel: audit: type=1400 audit(1707774739.827:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit: BPF prog-id=85 op=LOAD Feb 12 21:52:19.829000 audit: BPF prog-id=65 op=UNLOAD Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit: BPF prog-id=86 op=LOAD Feb 12 21:52:19.832000 audit: BPF prog-id=46 op=UNLOAD Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit: BPF prog-id=87 op=LOAD Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit: BPF prog-id=88 op=LOAD Feb 12 21:52:19.835000 audit: BPF prog-id=47 op=UNLOAD Feb 12 21:52:19.835000 audit: BPF prog-id=48 op=UNLOAD Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit: BPF prog-id=89 op=LOAD Feb 12 21:52:19.837000 audit: BPF prog-id=77 op=UNLOAD Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit: BPF prog-id=90 op=LOAD Feb 12 21:52:19.840000 audit: BPF prog-id=49 op=UNLOAD Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.840000 audit: BPF prog-id=91 op=LOAD Feb 12 21:52:19.840000 audit: BPF prog-id=73 op=UNLOAD Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit: BPF prog-id=92 op=LOAD Feb 12 21:52:19.842000 audit: BPF prog-id=50 op=UNLOAD Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit: BPF prog-id=93 op=LOAD Feb 12 21:52:19.842000 audit: BPF prog-id=51 op=UNLOAD Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit: BPF prog-id=94 op=LOAD Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.842000 audit: BPF prog-id=95 op=LOAD Feb 12 21:52:19.842000 audit: BPF prog-id=52 op=UNLOAD Feb 12 21:52:19.842000 audit: BPF prog-id=53 op=UNLOAD Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit: BPF prog-id=96 op=LOAD Feb 12 21:52:19.843000 audit: BPF prog-id=81 op=UNLOAD Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.843000 audit: BPF prog-id=97 op=LOAD Feb 12 21:52:19.843000 audit: BPF prog-id=54 op=UNLOAD Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit: BPF prog-id=98 op=LOAD Feb 12 21:52:19.844000 audit: BPF prog-id=55 op=UNLOAD Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit: BPF prog-id=99 op=LOAD Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.844000 audit: BPF prog-id=100 op=LOAD Feb 12 21:52:19.844000 audit: BPF prog-id=56 op=UNLOAD Feb 12 21:52:19.844000 audit: BPF prog-id=57 op=UNLOAD Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.845000 audit: BPF prog-id=101 op=LOAD Feb 12 21:52:19.845000 audit: BPF prog-id=61 op=UNLOAD Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.846000 audit: BPF prog-id=102 op=LOAD Feb 12 21:52:19.846000 audit: BPF prog-id=69 op=UNLOAD Feb 12 21:52:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit: BPF prog-id=103 op=LOAD Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit: BPF prog-id=104 op=LOAD Feb 12 21:52:19.847000 audit: BPF prog-id=58 op=UNLOAD Feb 12 21:52:19.847000 audit: BPF prog-id=59 op=UNLOAD Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.847000 audit: BPF prog-id=105 op=LOAD Feb 12 21:52:19.847000 audit: BPF prog-id=60 op=UNLOAD Feb 12 21:52:19.859628 systemd[1]: Stopping kubelet.service... Feb 12 21:52:19.873827 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 21:52:19.874007 systemd[1]: Stopped kubelet.service. Feb 12 21:52:19.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:19.875809 systemd[1]: Started kubelet.service. Feb 12 21:52:19.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:19.942609 kubelet[2138]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 21:52:19.945806 kubelet[2138]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 21:52:19.945806 kubelet[2138]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 21:52:19.945901 kubelet[2138]: I0212 21:52:19.945876 2138 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 21:52:19.950951 kubelet[2138]: I0212 21:52:19.950936 2138 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 21:52:19.951184 kubelet[2138]: I0212 21:52:19.951176 2138 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 21:52:19.951369 kubelet[2138]: I0212 21:52:19.951361 2138 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 21:52:19.952475 kubelet[2138]: I0212 21:52:19.952466 2138 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 21:52:19.953643 kubelet[2138]: I0212 21:52:19.953606 2138 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 21:52:19.955790 kubelet[2138]: I0212 21:52:19.955781 2138 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 21:52:19.955966 kubelet[2138]: I0212 21:52:19.955958 2138 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 21:52:19.956055 kubelet[2138]: I0212 21:52:19.956046 2138 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 21:52:19.956146 kubelet[2138]: I0212 21:52:19.956137 2138 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 21:52:19.956193 kubelet[2138]: I0212 21:52:19.956186 2138 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 21:52:19.956254 kubelet[2138]: I0212 21:52:19.956246 2138 state_mem.go:36] "Initialized new in-memory state store" Feb 12 21:52:19.959729 kubelet[2138]: I0212 21:52:19.959720 2138 kubelet.go:405] "Attempting to sync node with API server" Feb 12 21:52:19.959884 kubelet[2138]: I0212 21:52:19.959876 2138 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 21:52:19.959939 kubelet[2138]: I0212 21:52:19.959932 2138 kubelet.go:309] "Adding apiserver pod source" Feb 12 21:52:19.960000 kubelet[2138]: I0212 21:52:19.959993 2138 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 21:52:19.961612 kubelet[2138]: I0212 21:52:19.961603 2138 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 21:52:19.961912 kubelet[2138]: I0212 21:52:19.961904 2138 server.go:1168] "Started kubelet" Feb 12 21:52:19.962000 audit[2138]: AVC avc: denied { mac_admin } for pid=2138 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.962000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:52:19.962000 audit[2138]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b55830 a1=c000b20960 a2=c000b55800 a3=25 items=0 ppid=1 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:19.962000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:52:19.963602 kubelet[2138]: I0212 21:52:19.963593 2138 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 21:52:19.963000 audit[2138]: AVC avc: denied { mac_admin } for pid=2138 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:19.963000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:52:19.963000 audit[2138]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a1b1c0 a1=c000b20978 a2=c000b558c0 a3=25 items=0 ppid=1 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:19.963000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:52:19.963882 kubelet[2138]: I0212 21:52:19.963874 2138 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 21:52:19.963954 kubelet[2138]: I0212 21:52:19.963947 2138 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 21:52:19.965422 kubelet[2138]: E0212 21:52:19.965413 2138 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 21:52:19.965474 kubelet[2138]: E0212 21:52:19.965467 2138 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 21:52:19.977302 kubelet[2138]: I0212 21:52:19.976568 2138 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 21:52:19.977302 kubelet[2138]: I0212 21:52:19.976972 2138 server.go:461] "Adding debug handlers to kubelet server" Feb 12 21:52:19.978286 kubelet[2138]: I0212 21:52:19.977801 2138 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 21:52:19.982437 kubelet[2138]: I0212 21:52:19.982425 2138 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 21:52:19.983120 kubelet[2138]: I0212 21:52:19.982862 2138 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 21:52:20.013725 kubelet[2138]: I0212 21:52:20.013705 2138 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 21:52:20.014759 kubelet[2138]: I0212 21:52:20.014589 2138 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 21:52:20.014759 kubelet[2138]: I0212 21:52:20.014610 2138 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 21:52:20.014759 kubelet[2138]: I0212 21:52:20.014637 2138 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 21:52:20.014759 kubelet[2138]: E0212 21:52:20.014670 2138 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 21:52:20.028382 kubelet[2138]: I0212 21:52:20.028366 2138 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 21:52:20.028493 kubelet[2138]: I0212 21:52:20.028484 2138 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 21:52:20.028557 kubelet[2138]: I0212 21:52:20.028549 2138 state_mem.go:36] "Initialized new in-memory state store" Feb 12 21:52:20.028702 kubelet[2138]: I0212 21:52:20.028694 2138 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 21:52:20.028769 kubelet[2138]: I0212 21:52:20.028761 2138 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 21:52:20.028822 kubelet[2138]: I0212 21:52:20.028813 2138 policy_none.go:49] "None policy: Start" Feb 12 21:52:20.029451 kubelet[2138]: I0212 21:52:20.029441 2138 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 21:52:20.029516 kubelet[2138]: I0212 21:52:20.029508 2138 state_mem.go:35] "Initializing new in-memory state store" Feb 12 21:52:20.029642 kubelet[2138]: I0212 21:52:20.029635 2138 state_mem.go:75] "Updated machine memory state" Feb 12 21:52:20.034360 kubelet[2138]: I0212 21:52:20.034342 2138 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 21:52:20.033000 audit[2138]: AVC avc: denied { mac_admin } for pid=2138 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:20.033000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:52:20.033000 audit[2138]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d70930 a1=c000e47788 a2=c000d70900 a3=25 items=0 ppid=1 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:20.033000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:52:20.034599 kubelet[2138]: I0212 21:52:20.034381 2138 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 21:52:20.034599 kubelet[2138]: I0212 21:52:20.034516 2138 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 21:52:20.085803 kubelet[2138]: I0212 21:52:20.083584 2138 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 21:52:20.094321 kubelet[2138]: I0212 21:52:20.094296 2138 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 21:52:20.094417 kubelet[2138]: I0212 21:52:20.094345 2138 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 21:52:20.115190 kubelet[2138]: I0212 21:52:20.115160 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:20.115284 kubelet[2138]: I0212 21:52:20.115230 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:20.115284 kubelet[2138]: I0212 21:52:20.115267 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:20.283466 kubelet[2138]: I0212 21:52:20.283445 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 21:52:20.283558 kubelet[2138]: I0212 21:52:20.283475 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/29e5a6a3c5a22dd7a6d17d3f5b797ebb-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"29e5a6a3c5a22dd7a6d17d3f5b797ebb\") " pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:20.283558 kubelet[2138]: I0212 21:52:20.283489 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:20.283558 kubelet[2138]: I0212 21:52:20.283501 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:20.283558 kubelet[2138]: I0212 21:52:20.283513 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/29e5a6a3c5a22dd7a6d17d3f5b797ebb-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"29e5a6a3c5a22dd7a6d17d3f5b797ebb\") " pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:20.283558 kubelet[2138]: I0212 21:52:20.283538 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/29e5a6a3c5a22dd7a6d17d3f5b797ebb-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"29e5a6a3c5a22dd7a6d17d3f5b797ebb\") " pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:20.283661 kubelet[2138]: I0212 21:52:20.283559 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:20.283661 kubelet[2138]: I0212 21:52:20.283578 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:20.283661 kubelet[2138]: I0212 21:52:20.283591 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 21:52:20.961095 kubelet[2138]: I0212 21:52:20.961066 2138 apiserver.go:52] "Watching apiserver" Feb 12 21:52:20.983930 kubelet[2138]: I0212 21:52:20.983913 2138 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 21:52:20.986049 kubelet[2138]: I0212 21:52:20.986033 2138 reconciler.go:41] "Reconciler: start to sync state" Feb 12 21:52:21.040473 kubelet[2138]: E0212 21:52:21.040455 2138 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 21:52:21.053102 kubelet[2138]: I0212 21:52:21.053081 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.052577921 podCreationTimestamp="2024-02-12 21:52:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 21:52:21.047356118 +0000 UTC m=+1.157912904" watchObservedRunningTime="2024-02-12 21:52:21.052577921 +0000 UTC m=+1.163134698" Feb 12 21:52:21.060997 kubelet[2138]: I0212 21:52:21.060972 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.060938735 podCreationTimestamp="2024-02-12 21:52:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 21:52:21.053293878 +0000 UTC m=+1.163850656" watchObservedRunningTime="2024-02-12 21:52:21.060938735 +0000 UTC m=+1.171495514" Feb 12 21:52:21.073119 kubelet[2138]: I0212 21:52:21.073100 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.073075626 podCreationTimestamp="2024-02-12 21:52:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 21:52:21.061269336 +0000 UTC m=+1.171826115" watchObservedRunningTime="2024-02-12 21:52:21.073075626 +0000 UTC m=+1.183632404" Feb 12 21:52:22.205000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:22.205000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00085cec0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:22.205000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:22.205000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:22.205000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00085cf00 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:22.205000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:22.205000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:22.205000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00085cf40 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:22.205000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:22.205000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:52:22.205000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00085cfa0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:52:22.205000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:52:24.777095 sudo[1354]: pam_unix(sudo:session): session closed for user root Feb 12 21:52:24.778539 kernel: kauditd_printk_skb: 263 callbacks suppressed Feb 12 21:52:24.778586 kernel: audit: type=1106 audit(1707774744.776:941): pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:52:24.776000 audit[1354]: USER_END pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:52:24.778000 audit[1354]: CRED_DISP pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:52:24.784535 kernel: audit: type=1104 audit(1707774744.778:942): pid=1354 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:52:24.792204 sshd[1350]: pam_unix(sshd:session): session closed for user core Feb 12 21:52:24.794000 audit[1350]: USER_END pid=1350 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:52:24.799732 kernel: audit: type=1106 audit(1707774744.794:943): pid=1350 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:52:24.799801 kernel: audit: type=1104 audit(1707774744.794:944): pid=1350 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:52:24.794000 audit[1350]: CRED_DISP pid=1350 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:52:24.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.106:22-139.178.89.65:60140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:24.806874 systemd[1]: sshd@6-139.178.70.106:22-139.178.89.65:60140.service: Deactivated successfully. Feb 12 21:52:24.807336 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 21:52:24.807426 systemd[1]: session-9.scope: Consumed 3.007s CPU time. Feb 12 21:52:24.807566 systemd-logind[1141]: Session 9 logged out. Waiting for processes to exit. Feb 12 21:52:24.810628 kernel: audit: type=1131 audit(1707774744.806:945): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.106:22-139.178.89.65:60140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:52:24.810421 systemd-logind[1141]: Removed session 9. Feb 12 21:52:33.121965 kubelet[2138]: I0212 21:52:33.121946 2138 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 21:52:33.125057 env[1158]: time="2024-02-12T21:52:33.125036581Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 21:52:33.125339 kubelet[2138]: I0212 21:52:33.125326 2138 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 21:52:33.162918 kubelet[2138]: I0212 21:52:33.162893 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:33.166195 systemd[1]: Created slice kubepods-besteffort-pod10f5278a_7abe_4606_898c_9ee477a27ad3.slice. Feb 12 21:52:33.206373 kubelet[2138]: I0212 21:52:33.206352 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:33.209789 systemd[1]: Created slice kubepods-besteffort-pod3dfef30a_4534_4a7b_95d6_9ad688851f1f.slice. Feb 12 21:52:33.261381 kubelet[2138]: I0212 21:52:33.261356 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-995pd\" (UniqueName: \"kubernetes.io/projected/10f5278a-7abe-4606-898c-9ee477a27ad3-kube-api-access-995pd\") pod \"kube-proxy-mglkk\" (UID: \"10f5278a-7abe-4606-898c-9ee477a27ad3\") " pod="kube-system/kube-proxy-mglkk" Feb 12 21:52:33.261499 kubelet[2138]: I0212 21:52:33.261427 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/10f5278a-7abe-4606-898c-9ee477a27ad3-xtables-lock\") pod \"kube-proxy-mglkk\" (UID: \"10f5278a-7abe-4606-898c-9ee477a27ad3\") " pod="kube-system/kube-proxy-mglkk" Feb 12 21:52:33.261499 kubelet[2138]: I0212 21:52:33.261450 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/10f5278a-7abe-4606-898c-9ee477a27ad3-kube-proxy\") pod \"kube-proxy-mglkk\" (UID: \"10f5278a-7abe-4606-898c-9ee477a27ad3\") " pod="kube-system/kube-proxy-mglkk" Feb 12 21:52:33.261499 kubelet[2138]: I0212 21:52:33.261474 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/10f5278a-7abe-4606-898c-9ee477a27ad3-lib-modules\") pod \"kube-proxy-mglkk\" (UID: \"10f5278a-7abe-4606-898c-9ee477a27ad3\") " pod="kube-system/kube-proxy-mglkk" Feb 12 21:52:33.362067 kubelet[2138]: I0212 21:52:33.362042 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3dfef30a-4534-4a7b-95d6-9ad688851f1f-var-lib-calico\") pod \"tigera-operator-7ff8dc855-vmc8c\" (UID: \"3dfef30a-4534-4a7b-95d6-9ad688851f1f\") " pod="tigera-operator/tigera-operator-7ff8dc855-vmc8c" Feb 12 21:52:33.362067 kubelet[2138]: I0212 21:52:33.362068 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kmtqp\" (UniqueName: \"kubernetes.io/projected/3dfef30a-4534-4a7b-95d6-9ad688851f1f-kube-api-access-kmtqp\") pod \"tigera-operator-7ff8dc855-vmc8c\" (UID: \"3dfef30a-4534-4a7b-95d6-9ad688851f1f\") " pod="tigera-operator/tigera-operator-7ff8dc855-vmc8c" Feb 12 21:52:33.478348 env[1158]: time="2024-02-12T21:52:33.477730933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mglkk,Uid:10f5278a-7abe-4606-898c-9ee477a27ad3,Namespace:kube-system,Attempt:0,}" Feb 12 21:52:33.503425 env[1158]: time="2024-02-12T21:52:33.503367004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:33.503587 env[1158]: time="2024-02-12T21:52:33.503405500Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:33.503686 env[1158]: time="2024-02-12T21:52:33.503576288Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:33.503873 env[1158]: time="2024-02-12T21:52:33.503829438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/239ddd9e98b0bc249ee1e1c0de6107e4a1f3a45f3c73a6f7eab01ef15d2d0aa5 pid=2220 runtime=io.containerd.runc.v2 Feb 12 21:52:33.513202 systemd[1]: Started cri-containerd-239ddd9e98b0bc249ee1e1c0de6107e4a1f3a45f3c73a6f7eab01ef15d2d0aa5.scope. Feb 12 21:52:33.515904 env[1158]: time="2024-02-12T21:52:33.515810337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-vmc8c,Uid:3dfef30a-4534-4a7b-95d6-9ad688851f1f,Namespace:tigera-operator,Attempt:0,}" Feb 12 21:52:33.535436 kernel: audit: type=1400 audit(1707774753.527:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.535555 kernel: audit: type=1400 audit(1707774753.527:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.535577 kernel: audit: type=1400 audit(1707774753.527:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541463 kernel: audit: type=1400 audit(1707774753.527:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541538 kernel: audit: type=1400 audit(1707774753.527:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541635 env[1158]: time="2024-02-12T21:52:33.538244649Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:33.541635 env[1158]: time="2024-02-12T21:52:33.538279718Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:33.541635 env[1158]: time="2024-02-12T21:52:33.538287335Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:33.541635 env[1158]: time="2024-02-12T21:52:33.538399869Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a032e0bc40447c8681736b8044e204033080221a350f72f15c1c8dc0186ca1c9 pid=2254 runtime=io.containerd.runc.v2 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.546889 kernel: audit: type=1400 audit(1707774753.527:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.546934 kernel: audit: type=1400 audit(1707774753.527:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.549457 kernel: audit: type=1400 audit(1707774753.527:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.552567 kernel: audit: type=1400 audit(1707774753.527:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.555667 kernel: audit: type=1400 audit(1707774753.535:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.535000 audit: BPF prog-id=106 op=LOAD Feb 12 21:52:33.536000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.536000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2220 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233396464643965393862306263323439656531653163306465363130 Feb 12 21:52:33.536000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.536000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2220 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233396464643965393862306263323439656531653163306465363130 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.539000 audit: BPF prog-id=107 op=LOAD Feb 12 21:52:33.539000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a0d0 items=0 ppid=2220 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233396464643965393862306263323439656531653163306465363130 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.540000 audit: BPF prog-id=108 op=LOAD Feb 12 21:52:33.540000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039a118 items=0 ppid=2220 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233396464643965393862306263323439656531653163306465363130 Feb 12 21:52:33.541000 audit: BPF prog-id=108 op=UNLOAD Feb 12 21:52:33.541000 audit: BPF prog-id=107 op=UNLOAD Feb 12 21:52:33.560062 systemd[1]: Started cri-containerd-a032e0bc40447c8681736b8044e204033080221a350f72f15c1c8dc0186ca1c9.scope. Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.541000 audit: BPF prog-id=109 op=LOAD Feb 12 21:52:33.541000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039a528 items=0 ppid=2220 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233396464643965393862306263323439656531653163306465363130 Feb 12 21:52:33.570720 env[1158]: time="2024-02-12T21:52:33.570691741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mglkk,Uid:10f5278a-7abe-4606-898c-9ee477a27ad3,Namespace:kube-system,Attempt:0,} returns sandbox id \"239ddd9e98b0bc249ee1e1c0de6107e4a1f3a45f3c73a6f7eab01ef15d2d0aa5\"" Feb 12 21:52:33.572272 env[1158]: time="2024-02-12T21:52:33.572248337Z" level=info msg="CreateContainer within sandbox \"239ddd9e98b0bc249ee1e1c0de6107e4a1f3a45f3c73a6f7eab01ef15d2d0aa5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 21:52:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit: BPF prog-id=110 op=LOAD Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333265306263343034343763383638313733366238303434653230 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333265306263343034343763383638313733366238303434653230 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit: BPF prog-id=111 op=LOAD Feb 12 21:52:33.575000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021b6e0 items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333265306263343034343763383638313733366238303434653230 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit: BPF prog-id=112 op=LOAD Feb 12 21:52:33.575000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021b728 items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333265306263343034343763383638313733366238303434653230 Feb 12 21:52:33.575000 audit: BPF prog-id=112 op=UNLOAD Feb 12 21:52:33.575000 audit: BPF prog-id=111 op=UNLOAD Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.575000 audit: BPF prog-id=113 op=LOAD Feb 12 21:52:33.575000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021bb38 items=0 ppid=2254 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333265306263343034343763383638313733366238303434653230 Feb 12 21:52:33.595914 env[1158]: time="2024-02-12T21:52:33.595883531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-vmc8c,Uid:3dfef30a-4534-4a7b-95d6-9ad688851f1f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a032e0bc40447c8681736b8044e204033080221a350f72f15c1c8dc0186ca1c9\"" Feb 12 21:52:33.603051 env[1158]: time="2024-02-12T21:52:33.603017626Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 21:52:33.623962 env[1158]: time="2024-02-12T21:52:33.623933341Z" level=info msg="CreateContainer within sandbox \"239ddd9e98b0bc249ee1e1c0de6107e4a1f3a45f3c73a6f7eab01ef15d2d0aa5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c5c48ddec8c079b67e5d9ac292e9ae11e1fd5cb8da3d258a27cfd599bb9ccaff\"" Feb 12 21:52:33.625417 env[1158]: time="2024-02-12T21:52:33.624353704Z" level=info msg="StartContainer for \"c5c48ddec8c079b67e5d9ac292e9ae11e1fd5cb8da3d258a27cfd599bb9ccaff\"" Feb 12 21:52:33.633998 systemd[1]: Started cri-containerd-c5c48ddec8c079b67e5d9ac292e9ae11e1fd5cb8da3d258a27cfd599bb9ccaff.scope. Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f65166213e8 items=0 ppid=2220 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335633438646465633863303739623637653564396163323932653961 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.644000 audit: BPF prog-id=114 op=LOAD Feb 12 21:52:33.644000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a588 items=0 ppid=2220 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335633438646465633863303739623637653564396163323932653961 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.645000 audit: BPF prog-id=115 op=LOAD Feb 12 21:52:33.645000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028a5d8 items=0 ppid=2220 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335633438646465633863303739623637653564396163323932653961 Feb 12 21:52:33.645000 audit: BPF prog-id=115 op=UNLOAD Feb 12 21:52:33.645000 audit: BPF prog-id=114 op=UNLOAD Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:33.646000 audit: BPF prog-id=116 op=LOAD Feb 12 21:52:33.646000 audit[2302]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028a668 items=0 ppid=2220 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:33.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335633438646465633863303739623637653564396163323932653961 Feb 12 21:52:33.655484 env[1158]: time="2024-02-12T21:52:33.655445225Z" level=info msg="StartContainer for \"c5c48ddec8c079b67e5d9ac292e9ae11e1fd5cb8da3d258a27cfd599bb9ccaff\" returns successfully" Feb 12 21:52:34.320000 audit[2352]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.320000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb328c200 a2=0 a3=7ffcb328c1ec items=0 ppid=2312 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 21:52:34.322000 audit[2353]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.322000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc42b5c740 a2=0 a3=7ffc42b5c72c items=0 ppid=2312 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 21:52:34.322000 audit[2354]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.322000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff24f22f50 a2=0 a3=7fff24f22f3c items=0 ppid=2312 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 21:52:34.323000 audit[2355]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.323000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc552c7d0 a2=0 a3=7ffdc552c7bc items=0 ppid=2312 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 21:52:34.324000 audit[2356]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.324000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3de97480 a2=0 a3=7ffd3de9746c items=0 ppid=2312 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 21:52:34.324000 audit[2357]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.324000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7bdf36d0 a2=0 a3=7ffd7bdf36bc items=0 ppid=2312 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 21:52:34.370097 systemd[1]: run-containerd-runc-k8s.io-239ddd9e98b0bc249ee1e1c0de6107e4a1f3a45f3c73a6f7eab01ef15d2d0aa5-runc.sUiu9H.mount: Deactivated successfully. Feb 12 21:52:34.426000 audit[2358]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.426000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe7ebf4af0 a2=0 a3=7ffe7ebf4adc items=0 ppid=2312 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 21:52:34.429000 audit[2360]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.429000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdb6cd0df0 a2=0 a3=7ffdb6cd0ddc items=0 ppid=2312 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 21:52:34.436000 audit[2363]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.436000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc709cf2a0 a2=0 a3=7ffc709cf28c items=0 ppid=2312 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 21:52:34.437000 audit[2364]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.437000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed92987f0 a2=0 a3=7ffed92987dc items=0 ppid=2312 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 21:52:34.439000 audit[2366]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.439000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd13f6bb40 a2=0 a3=7ffd13f6bb2c items=0 ppid=2312 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 21:52:34.440000 audit[2367]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.440000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff166ca5d0 a2=0 a3=7fff166ca5bc items=0 ppid=2312 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 21:52:34.442000 audit[2369]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.442000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff96ad2380 a2=0 a3=7fff96ad236c items=0 ppid=2312 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 21:52:34.445000 audit[2372]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.445000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc2262f70 a2=0 a3=7ffcc2262f5c items=0 ppid=2312 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 21:52:34.446000 audit[2373]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.446000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd577718d0 a2=0 a3=7ffd577718bc items=0 ppid=2312 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 21:52:34.448000 audit[2375]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.448000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc68c40dc0 a2=0 a3=7ffc68c40dac items=0 ppid=2312 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 21:52:34.449000 audit[2376]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.449000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff124d7180 a2=0 a3=7fff124d716c items=0 ppid=2312 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 21:52:34.451000 audit[2378]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.451000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4ab847f0 a2=0 a3=7ffd4ab847dc items=0 ppid=2312 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 21:52:34.453000 audit[2381]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.453000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde32515c0 a2=0 a3=7ffde32515ac items=0 ppid=2312 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 21:52:34.456000 audit[2384]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.456000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea1e6ef80 a2=0 a3=7ffea1e6ef6c items=0 ppid=2312 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 21:52:34.457000 audit[2385]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.457000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca0043620 a2=0 a3=7ffca004360c items=0 ppid=2312 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 21:52:34.459000 audit[2387]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.459000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffeb7128d80 a2=0 a3=7ffeb7128d6c items=0 ppid=2312 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:52:34.461000 audit[2390]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.461000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe07a9c710 a2=0 a3=7ffe07a9c6fc items=0 ppid=2312 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:52:34.465000 audit[2395]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.465000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce828e670 a2=0 a3=7ffce828e65c items=0 ppid=2312 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 21:52:34.466000 audit[2397]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:52:34.466000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff8cef37a0 a2=0 a3=7fff8cef378c items=0 ppid=2312 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 21:52:34.477000 audit[2399]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:34.477000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffef742f630 a2=0 a3=7ffef742f61c items=0 ppid=2312 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:34.482000 audit[2399]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:34.482000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffef742f630 a2=0 a3=7ffef742f61c items=0 ppid=2312 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:34.486000 audit[2406]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:34.486000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffd61032c0 a2=0 a3=7fffd61032ac items=0 ppid=2312 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:34.487000 audit[2406]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:34.487000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fffd61032c0 a2=0 a3=31030 items=0 ppid=2312 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:34.490000 audit[2407]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.490000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff28315a10 a2=0 a3=7fff283159fc items=0 ppid=2312 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 21:52:34.492000 audit[2409]: NETFILTER_CFG table=filter:68 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.492000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff151431d0 a2=0 a3=7fff151431bc items=0 ppid=2312 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 21:52:34.497000 audit[2412]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.497000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd66fba4a0 a2=0 a3=7ffd66fba48c items=0 ppid=2312 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 21:52:34.497000 audit[2413]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.497000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc681628d0 a2=0 a3=7ffc681628bc items=0 ppid=2312 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 21:52:34.499000 audit[2415]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.499000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5025c7d0 a2=0 a3=7ffc5025c7bc items=0 ppid=2312 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 21:52:34.500000 audit[2416]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.500000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe305802e0 a2=0 a3=7ffe305802cc items=0 ppid=2312 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 21:52:34.501000 audit[2418]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.501000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd9fcaa50 a2=0 a3=7ffdd9fcaa3c items=0 ppid=2312 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 21:52:34.504000 audit[2421]: NETFILTER_CFG table=filter:74 family=10 entries=2 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.504000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb79c6ea0 a2=0 a3=7ffcb79c6e8c items=0 ppid=2312 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 21:52:34.505000 audit[2422]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.505000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc526b4d40 a2=0 a3=7ffc526b4d2c items=0 ppid=2312 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 21:52:34.506000 audit[2424]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.506000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4ee02a20 a2=0 a3=7fff4ee02a0c items=0 ppid=2312 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 21:52:34.507000 audit[2425]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.507000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe893297a0 a2=0 a3=7ffe8932978c items=0 ppid=2312 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 21:52:34.509000 audit[2427]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.509000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee9dad8a0 a2=0 a3=7ffee9dad88c items=0 ppid=2312 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 21:52:34.511000 audit[2430]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.511000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf50f9840 a2=0 a3=7ffdf50f982c items=0 ppid=2312 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 21:52:34.514000 audit[2433]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.514000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc674071c0 a2=0 a3=7ffc674071ac items=0 ppid=2312 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 21:52:34.515000 audit[2434]: NETFILTER_CFG table=nat:81 family=10 entries=1 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.515000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc0936490 a2=0 a3=7ffcc093647c items=0 ppid=2312 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 21:52:34.516000 audit[2436]: NETFILTER_CFG table=nat:82 family=10 entries=2 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.516000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeb1de2800 a2=0 a3=7ffeb1de27ec items=0 ppid=2312 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:52:34.519000 audit[2439]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.519000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe9a46d3d0 a2=0 a3=7ffe9a46d3bc items=0 ppid=2312 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:52:34.520000 audit[2440]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.520000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4f7d3c30 a2=0 a3=7fff4f7d3c1c items=0 ppid=2312 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 21:52:34.521000 audit[2442]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.521000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdcb2985e0 a2=0 a3=7ffdcb2985cc items=0 ppid=2312 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:52:34.524000 audit[2445]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.524000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd29b39340 a2=0 a3=7ffd29b3932c items=0 ppid=2312 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:52:34.525000 audit[2446]: NETFILTER_CFG table=nat:87 family=10 entries=1 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.525000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1d6775c0 a2=0 a3=7ffc1d6775ac items=0 ppid=2312 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 21:52:34.527000 audit[2448]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:52:34.527000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff76237340 a2=0 a3=7fff7623732c items=0 ppid=2312 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 21:52:34.529000 audit[2450]: NETFILTER_CFG table=filter:89 family=10 entries=3 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 21:52:34.529000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe7e7b1b40 a2=0 a3=7ffe7e7b1b2c items=0 ppid=2312 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.529000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:34.530000 audit[2450]: NETFILTER_CFG table=nat:90 family=10 entries=7 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 21:52:34.530000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe7e7b1b40 a2=0 a3=7ffe7e7b1b2c items=0 ppid=2312 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:34.530000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:34.858609 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4232595463.mount: Deactivated successfully. Feb 12 21:52:35.831201 env[1158]: time="2024-02-12T21:52:35.831174554Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:35.836073 env[1158]: time="2024-02-12T21:52:35.836059737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:35.840110 env[1158]: time="2024-02-12T21:52:35.840099117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:35.843400 env[1158]: time="2024-02-12T21:52:35.843388228Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:35.843849 env[1158]: time="2024-02-12T21:52:35.843835794Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 21:52:35.846336 env[1158]: time="2024-02-12T21:52:35.846321212Z" level=info msg="CreateContainer within sandbox \"a032e0bc40447c8681736b8044e204033080221a350f72f15c1c8dc0186ca1c9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 21:52:35.865124 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1757286014.mount: Deactivated successfully. Feb 12 21:52:35.867699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1782568477.mount: Deactivated successfully. Feb 12 21:52:35.869719 env[1158]: time="2024-02-12T21:52:35.869663764Z" level=info msg="CreateContainer within sandbox \"a032e0bc40447c8681736b8044e204033080221a350f72f15c1c8dc0186ca1c9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2ca603e7f6bab27fecf124be83ded5dcaa87e98577baf648f8eda1b6ca2bd8f1\"" Feb 12 21:52:35.871115 env[1158]: time="2024-02-12T21:52:35.871100666Z" level=info msg="StartContainer for \"2ca603e7f6bab27fecf124be83ded5dcaa87e98577baf648f8eda1b6ca2bd8f1\"" Feb 12 21:52:35.883241 systemd[1]: Started cri-containerd-2ca603e7f6bab27fecf124be83ded5dcaa87e98577baf648f8eda1b6ca2bd8f1.scope. Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit: BPF prog-id=117 op=LOAD Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2254 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613630336537663662616232376665636631323462653833646564 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2254 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613630336537663662616232376665636631323462653833646564 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.893000 audit: BPF prog-id=118 op=LOAD Feb 12 21:52:35.893000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c9d10 items=0 ppid=2254 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:35.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613630336537663662616232376665636631323462653833646564 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit: BPF prog-id=119 op=LOAD Feb 12 21:52:35.894000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c9d58 items=0 ppid=2254 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:35.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613630336537663662616232376665636631323462653833646564 Feb 12 21:52:35.894000 audit: BPF prog-id=119 op=UNLOAD Feb 12 21:52:35.894000 audit: BPF prog-id=118 op=UNLOAD Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:35.894000 audit: BPF prog-id=120 op=LOAD Feb 12 21:52:35.894000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b4168 items=0 ppid=2254 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:35.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613630336537663662616232376665636631323462653833646564 Feb 12 21:52:35.905987 env[1158]: time="2024-02-12T21:52:35.903726551Z" level=info msg="StartContainer for \"2ca603e7f6bab27fecf124be83ded5dcaa87e98577baf648f8eda1b6ca2bd8f1\" returns successfully" Feb 12 21:52:36.067123 kubelet[2138]: I0212 21:52:36.067102 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mglkk" podStartSLOduration=3.06707542 podCreationTimestamp="2024-02-12 21:52:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 21:52:34.071847834 +0000 UTC m=+14.182404619" watchObservedRunningTime="2024-02-12 21:52:36.06707542 +0000 UTC m=+16.177632199" Feb 12 21:52:37.669000 audit[2492]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:37.669000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc32c85c10 a2=0 a3=7ffc32c85bfc items=0 ppid=2312 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:37.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:37.669000 audit[2492]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:37.669000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc32c85c10 a2=0 a3=31030 items=0 ppid=2312 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:37.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:37.677000 audit[2494]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:37.677000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcff6ed140 a2=0 a3=7ffcff6ed12c items=0 ppid=2312 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:37.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:37.678000 audit[2494]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:37.678000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcff6ed140 a2=0 a3=31030 items=0 ppid=2312 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:37.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:37.820264 kubelet[2138]: I0212 21:52:37.820243 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-vmc8c" podStartSLOduration=2.572288071 podCreationTimestamp="2024-02-12 21:52:33 +0000 UTC" firstStartedPulling="2024-02-12 21:52:33.596499962 +0000 UTC m=+13.707056735" lastFinishedPulling="2024-02-12 21:52:35.844414676 +0000 UTC m=+15.954971451" observedRunningTime="2024-02-12 21:52:36.067384437 +0000 UTC m=+16.177941221" watchObservedRunningTime="2024-02-12 21:52:37.820202787 +0000 UTC m=+17.930759576" Feb 12 21:52:37.820784 kubelet[2138]: I0212 21:52:37.820770 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:37.824623 systemd[1]: Created slice kubepods-besteffort-pod9bb5b657_ab50_49c4_94d0_0754e6b402c7.slice. Feb 12 21:52:37.883347 kubelet[2138]: I0212 21:52:37.883328 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:37.886612 systemd[1]: Created slice kubepods-besteffort-pod9dda7899_755d_402a_b740_8201300c6350.slice. Feb 12 21:52:37.990692 kubelet[2138]: I0212 21:52:37.990623 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/9bb5b657-ab50-49c4-94d0-0754e6b402c7-typha-certs\") pod \"calico-typha-5bf557765b-6pwwl\" (UID: \"9bb5b657-ab50-49c4-94d0-0754e6b402c7\") " pod="calico-system/calico-typha-5bf557765b-6pwwl" Feb 12 21:52:37.990692 kubelet[2138]: I0212 21:52:37.990651 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-var-run-calico\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990692 kubelet[2138]: I0212 21:52:37.990665 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hhs5\" (UniqueName: \"kubernetes.io/projected/9dda7899-755d-402a-b740-8201300c6350-kube-api-access-5hhs5\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990692 kubelet[2138]: I0212 21:52:37.990677 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-cni-net-dir\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990692 kubelet[2138]: I0212 21:52:37.990691 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-cni-log-dir\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990851 kubelet[2138]: I0212 21:52:37.990703 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9bb5b657-ab50-49c4-94d0-0754e6b402c7-tigera-ca-bundle\") pod \"calico-typha-5bf557765b-6pwwl\" (UID: \"9bb5b657-ab50-49c4-94d0-0754e6b402c7\") " pod="calico-system/calico-typha-5bf557765b-6pwwl" Feb 12 21:52:37.990851 kubelet[2138]: I0212 21:52:37.990715 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9dda7899-755d-402a-b740-8201300c6350-node-certs\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990851 kubelet[2138]: I0212 21:52:37.990725 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-cni-bin-dir\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990851 kubelet[2138]: I0212 21:52:37.990738 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-policysync\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990851 kubelet[2138]: I0212 21:52:37.990751 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zctbk\" (UniqueName: \"kubernetes.io/projected/9bb5b657-ab50-49c4-94d0-0754e6b402c7-kube-api-access-zctbk\") pod \"calico-typha-5bf557765b-6pwwl\" (UID: \"9bb5b657-ab50-49c4-94d0-0754e6b402c7\") " pod="calico-system/calico-typha-5bf557765b-6pwwl" Feb 12 21:52:37.990945 kubelet[2138]: I0212 21:52:37.990762 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-xtables-lock\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990945 kubelet[2138]: I0212 21:52:37.990773 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9dda7899-755d-402a-b740-8201300c6350-tigera-ca-bundle\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990945 kubelet[2138]: I0212 21:52:37.990804 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-lib-modules\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990945 kubelet[2138]: I0212 21:52:37.990824 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-var-lib-calico\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:37.990945 kubelet[2138]: I0212 21:52:37.990835 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9dda7899-755d-402a-b740-8201300c6350-flexvol-driver-host\") pod \"calico-node-z7tqg\" (UID: \"9dda7899-755d-402a-b740-8201300c6350\") " pod="calico-system/calico-node-z7tqg" Feb 12 21:52:38.016215 kubelet[2138]: I0212 21:52:38.016197 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:38.016398 kubelet[2138]: E0212 21:52:38.016385 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:38.092331 kubelet[2138]: E0212 21:52:38.092316 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.092434 kubelet[2138]: W0212 21:52:38.092424 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.092486 kubelet[2138]: E0212 21:52:38.092478 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.092649 kubelet[2138]: E0212 21:52:38.092642 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.092698 kubelet[2138]: W0212 21:52:38.092689 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.092744 kubelet[2138]: E0212 21:52:38.092737 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.092876 kubelet[2138]: E0212 21:52:38.092870 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.092933 kubelet[2138]: W0212 21:52:38.092926 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.092979 kubelet[2138]: E0212 21:52:38.092973 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.093130 kubelet[2138]: E0212 21:52:38.093124 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.093177 kubelet[2138]: W0212 21:52:38.093168 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.093221 kubelet[2138]: E0212 21:52:38.093214 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.095970 kubelet[2138]: E0212 21:52:38.095962 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.096032 kubelet[2138]: W0212 21:52:38.096022 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.096085 kubelet[2138]: E0212 21:52:38.096078 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.096202 kubelet[2138]: E0212 21:52:38.096197 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.096248 kubelet[2138]: W0212 21:52:38.096240 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.096297 kubelet[2138]: E0212 21:52:38.096290 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.096403 kubelet[2138]: E0212 21:52:38.096397 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.096448 kubelet[2138]: W0212 21:52:38.096440 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.098382 kubelet[2138]: E0212 21:52:38.096641 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.101342 kubelet[2138]: E0212 21:52:38.101325 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.101440 kubelet[2138]: W0212 21:52:38.101429 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.101510 kubelet[2138]: E0212 21:52:38.101498 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.101773 kubelet[2138]: E0212 21:52:38.101766 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.101832 kubelet[2138]: W0212 21:52:38.101824 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.101892 kubelet[2138]: E0212 21:52:38.101881 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.102135 kubelet[2138]: E0212 21:52:38.102129 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.102181 kubelet[2138]: W0212 21:52:38.102173 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.102240 kubelet[2138]: E0212 21:52:38.102230 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.102567 kubelet[2138]: E0212 21:52:38.102560 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.102619 kubelet[2138]: W0212 21:52:38.102611 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.102681 kubelet[2138]: E0212 21:52:38.102671 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.102961 kubelet[2138]: E0212 21:52:38.102954 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.103010 kubelet[2138]: W0212 21:52:38.103003 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.103149 kubelet[2138]: E0212 21:52:38.103137 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.107110 kubelet[2138]: E0212 21:52:38.107102 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.107178 kubelet[2138]: W0212 21:52:38.107169 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.107298 kubelet[2138]: E0212 21:52:38.107287 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.111039 kubelet[2138]: E0212 21:52:38.111030 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.111109 kubelet[2138]: W0212 21:52:38.111100 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.111176 kubelet[2138]: E0212 21:52:38.111165 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.111309 kubelet[2138]: E0212 21:52:38.111303 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.111358 kubelet[2138]: W0212 21:52:38.111350 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.111415 kubelet[2138]: E0212 21:52:38.111405 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.111544 kubelet[2138]: E0212 21:52:38.111537 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.111592 kubelet[2138]: W0212 21:52:38.111584 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.112274 kubelet[2138]: E0212 21:52:38.112263 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.112360 kubelet[2138]: E0212 21:52:38.112353 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.112406 kubelet[2138]: W0212 21:52:38.112398 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.112463 kubelet[2138]: E0212 21:52:38.112453 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.112593 kubelet[2138]: E0212 21:52:38.112581 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.112642 kubelet[2138]: W0212 21:52:38.112635 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.112700 kubelet[2138]: E0212 21:52:38.112691 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.112811 kubelet[2138]: E0212 21:52:38.112806 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.112874 kubelet[2138]: W0212 21:52:38.112867 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.112929 kubelet[2138]: E0212 21:52:38.112919 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113036 kubelet[2138]: E0212 21:52:38.113031 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113081 kubelet[2138]: W0212 21:52:38.113074 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113141 kubelet[2138]: E0212 21:52:38.113126 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113238 kubelet[2138]: E0212 21:52:38.113233 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113284 kubelet[2138]: W0212 21:52:38.113277 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113334 kubelet[2138]: E0212 21:52:38.113327 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113490 kubelet[2138]: E0212 21:52:38.113480 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113490 kubelet[2138]: W0212 21:52:38.113488 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113564 kubelet[2138]: E0212 21:52:38.113498 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113621 kubelet[2138]: E0212 21:52:38.113613 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113621 kubelet[2138]: W0212 21:52:38.113618 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113671 kubelet[2138]: E0212 21:52:38.113626 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113715 kubelet[2138]: E0212 21:52:38.113706 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113715 kubelet[2138]: W0212 21:52:38.113713 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113762 kubelet[2138]: E0212 21:52:38.113720 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113803 kubelet[2138]: E0212 21:52:38.113795 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113803 kubelet[2138]: W0212 21:52:38.113800 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113852 kubelet[2138]: E0212 21:52:38.113806 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113881 kubelet[2138]: E0212 21:52:38.113872 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113881 kubelet[2138]: W0212 21:52:38.113876 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.113881 kubelet[2138]: E0212 21:52:38.113881 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.113976 kubelet[2138]: E0212 21:52:38.113968 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.113976 kubelet[2138]: W0212 21:52:38.113973 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114028 kubelet[2138]: E0212 21:52:38.113979 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114055 kubelet[2138]: E0212 21:52:38.114046 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114055 kubelet[2138]: W0212 21:52:38.114052 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114101 kubelet[2138]: E0212 21:52:38.114059 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114135 kubelet[2138]: E0212 21:52:38.114127 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114135 kubelet[2138]: W0212 21:52:38.114132 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114190 kubelet[2138]: E0212 21:52:38.114137 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114227 kubelet[2138]: E0212 21:52:38.114220 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114227 kubelet[2138]: W0212 21:52:38.114225 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114274 kubelet[2138]: E0212 21:52:38.114232 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114349 kubelet[2138]: E0212 21:52:38.114342 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114349 kubelet[2138]: W0212 21:52:38.114347 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114404 kubelet[2138]: E0212 21:52:38.114353 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114475 kubelet[2138]: E0212 21:52:38.114423 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114475 kubelet[2138]: W0212 21:52:38.114429 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114475 kubelet[2138]: E0212 21:52:38.114435 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114622 kubelet[2138]: E0212 21:52:38.114614 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114656 kubelet[2138]: W0212 21:52:38.114620 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114656 kubelet[2138]: E0212 21:52:38.114632 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114711 kubelet[2138]: E0212 21:52:38.114702 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114711 kubelet[2138]: W0212 21:52:38.114708 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114761 kubelet[2138]: E0212 21:52:38.114713 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.114780 kubelet[2138]: E0212 21:52:38.114775 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.114780 kubelet[2138]: W0212 21:52:38.114779 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.114818 kubelet[2138]: E0212 21:52:38.114784 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.127412 env[1158]: time="2024-02-12T21:52:38.127103957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5bf557765b-6pwwl,Uid:9bb5b657-ab50-49c4-94d0-0754e6b402c7,Namespace:calico-system,Attempt:0,}" Feb 12 21:52:38.158329 env[1158]: time="2024-02-12T21:52:38.158277027Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:38.158437 env[1158]: time="2024-02-12T21:52:38.158308839Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:38.158437 env[1158]: time="2024-02-12T21:52:38.158330996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:38.158500 env[1158]: time="2024-02-12T21:52:38.158445733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf1f119ce8b899b830221dada9076c1121f6db901bd1f402e854bcc4cbc9e58f pid=2540 runtime=io.containerd.runc.v2 Feb 12 21:52:38.171463 systemd[1]: Started cri-containerd-cf1f119ce8b899b830221dada9076c1121f6db901bd1f402e854bcc4cbc9e58f.scope. Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.179000 audit: BPF prog-id=121 op=LOAD Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2540 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316631313963653862383939623833303232316461646139303736 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2540 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316631313963653862383939623833303232316461646139303736 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit: BPF prog-id=122 op=LOAD Feb 12 21:52:38.180000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d6a30 items=0 ppid=2540 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316631313963653862383939623833303232316461646139303736 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit: BPF prog-id=123 op=LOAD Feb 12 21:52:38.180000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d6a78 items=0 ppid=2540 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316631313963653862383939623833303232316461646139303736 Feb 12 21:52:38.180000 audit: BPF prog-id=123 op=UNLOAD Feb 12 21:52:38.180000 audit: BPF prog-id=122 op=UNLOAD Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.180000 audit: BPF prog-id=124 op=LOAD Feb 12 21:52:38.180000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002d6e88 items=0 ppid=2540 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366316631313963653862383939623833303232316461646139303736 Feb 12 21:52:38.189228 env[1158]: time="2024-02-12T21:52:38.189204919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z7tqg,Uid:9dda7899-755d-402a-b740-8201300c6350,Namespace:calico-system,Attempt:0,}" Feb 12 21:52:38.191858 kubelet[2138]: E0212 21:52:38.191699 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.191858 kubelet[2138]: W0212 21:52:38.191710 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.191858 kubelet[2138]: E0212 21:52:38.191724 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.191858 kubelet[2138]: I0212 21:52:38.191743 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f72389d7-6cf4-48b0-afb1-b2ab2d4789f1-registration-dir\") pod \"csi-node-driver-hlb9m\" (UID: \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\") " pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:38.191858 kubelet[2138]: E0212 21:52:38.191826 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.191858 kubelet[2138]: W0212 21:52:38.191831 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.191858 kubelet[2138]: E0212 21:52:38.191838 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.191858 kubelet[2138]: I0212 21:52:38.191848 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f72389d7-6cf4-48b0-afb1-b2ab2d4789f1-kubelet-dir\") pod \"csi-node-driver-hlb9m\" (UID: \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\") " pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:38.192158 kubelet[2138]: E0212 21:52:38.192149 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.192158 kubelet[2138]: W0212 21:52:38.192157 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.192220 kubelet[2138]: E0212 21:52:38.192166 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.192316 kubelet[2138]: E0212 21:52:38.192307 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.192316 kubelet[2138]: W0212 21:52:38.192313 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.192370 kubelet[2138]: E0212 21:52:38.192320 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.192460 kubelet[2138]: E0212 21:52:38.192447 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.192460 kubelet[2138]: W0212 21:52:38.192458 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.192514 kubelet[2138]: E0212 21:52:38.192465 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.192606 kubelet[2138]: E0212 21:52:38.192598 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.192636 kubelet[2138]: W0212 21:52:38.192604 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.192636 kubelet[2138]: E0212 21:52:38.192616 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.192765 kubelet[2138]: E0212 21:52:38.192758 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.192765 kubelet[2138]: W0212 21:52:38.192764 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.192820 kubelet[2138]: E0212 21:52:38.192770 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.192820 kubelet[2138]: I0212 21:52:38.192783 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f72389d7-6cf4-48b0-afb1-b2ab2d4789f1-varrun\") pod \"csi-node-driver-hlb9m\" (UID: \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\") " pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:38.192933 kubelet[2138]: E0212 21:52:38.192923 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.192933 kubelet[2138]: W0212 21:52:38.192930 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.192987 kubelet[2138]: E0212 21:52:38.192943 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.192987 kubelet[2138]: I0212 21:52:38.192954 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f72389d7-6cf4-48b0-afb1-b2ab2d4789f1-socket-dir\") pod \"csi-node-driver-hlb9m\" (UID: \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\") " pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:38.193167 kubelet[2138]: E0212 21:52:38.193159 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.193167 kubelet[2138]: W0212 21:52:38.193165 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.193221 kubelet[2138]: E0212 21:52:38.193175 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.193380 kubelet[2138]: E0212 21:52:38.193369 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.193380 kubelet[2138]: W0212 21:52:38.193374 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.193380 kubelet[2138]: E0212 21:52:38.193381 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.193568 kubelet[2138]: E0212 21:52:38.193541 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.193568 kubelet[2138]: W0212 21:52:38.193547 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.193568 kubelet[2138]: E0212 21:52:38.193554 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.193568 kubelet[2138]: I0212 21:52:38.193564 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dtlpx\" (UniqueName: \"kubernetes.io/projected/f72389d7-6cf4-48b0-afb1-b2ab2d4789f1-kube-api-access-dtlpx\") pod \"csi-node-driver-hlb9m\" (UID: \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\") " pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:38.194415 kubelet[2138]: E0212 21:52:38.194399 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.194415 kubelet[2138]: W0212 21:52:38.194409 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.194477 kubelet[2138]: E0212 21:52:38.194417 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.194513 kubelet[2138]: E0212 21:52:38.194502 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.194513 kubelet[2138]: W0212 21:52:38.194508 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.194513 kubelet[2138]: E0212 21:52:38.194514 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.194754 kubelet[2138]: E0212 21:52:38.194744 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.194754 kubelet[2138]: W0212 21:52:38.194751 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.194849 kubelet[2138]: E0212 21:52:38.194759 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.195073 kubelet[2138]: E0212 21:52:38.195065 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.195073 kubelet[2138]: W0212 21:52:38.195071 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.195124 kubelet[2138]: E0212 21:52:38.195078 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.199231 env[1158]: time="2024-02-12T21:52:38.199192346Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:52:38.199330 env[1158]: time="2024-02-12T21:52:38.199315669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:52:38.199396 env[1158]: time="2024-02-12T21:52:38.199383244Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:52:38.199541 env[1158]: time="2024-02-12T21:52:38.199518038Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184 pid=2587 runtime=io.containerd.runc.v2 Feb 12 21:52:38.210720 systemd[1]: Started cri-containerd-0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184.scope. Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.229000 audit: BPF prog-id=125 op=LOAD Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2587 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333664343735313961393634626263363533326139646335653934 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2587 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333664343735313961393634626263363533326139646335653934 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.230000 audit: BPF prog-id=126 op=LOAD Feb 12 21:52:38.230000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00033fdc0 items=0 ppid=2587 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333664343735313961393634626263363533326139646335653934 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.231000 audit: BPF prog-id=127 op=LOAD Feb 12 21:52:38.231000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00033fe08 items=0 ppid=2587 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333664343735313961393634626263363533326139646335653934 Feb 12 21:52:38.231000 audit: BPF prog-id=127 op=UNLOAD Feb 12 21:52:38.231000 audit: BPF prog-id=126 op=UNLOAD Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:38.232000 audit: BPF prog-id=128 op=LOAD Feb 12 21:52:38.232000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038c218 items=0 ppid=2587 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333664343735313961393634626263363533326139646335653934 Feb 12 21:52:38.238079 env[1158]: time="2024-02-12T21:52:38.238054743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5bf557765b-6pwwl,Uid:9bb5b657-ab50-49c4-94d0-0754e6b402c7,Namespace:calico-system,Attempt:0,} returns sandbox id \"cf1f119ce8b899b830221dada9076c1121f6db901bd1f402e854bcc4cbc9e58f\"" Feb 12 21:52:38.239115 env[1158]: time="2024-02-12T21:52:38.239100961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 21:52:38.247247 env[1158]: time="2024-02-12T21:52:38.242578079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z7tqg,Uid:9dda7899-755d-402a-b740-8201300c6350,Namespace:calico-system,Attempt:0,} returns sandbox id \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\"" Feb 12 21:52:38.295732 kubelet[2138]: E0212 21:52:38.295706 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.295732 kubelet[2138]: W0212 21:52:38.295725 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.295866 kubelet[2138]: E0212 21:52:38.295740 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.296032 kubelet[2138]: E0212 21:52:38.295959 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.296032 kubelet[2138]: W0212 21:52:38.295970 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.296032 kubelet[2138]: E0212 21:52:38.295978 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.296176 kubelet[2138]: E0212 21:52:38.296144 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.296176 kubelet[2138]: W0212 21:52:38.296152 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.296176 kubelet[2138]: E0212 21:52:38.296164 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.296259 kubelet[2138]: E0212 21:52:38.296250 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.296259 kubelet[2138]: W0212 21:52:38.296256 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.296314 kubelet[2138]: E0212 21:52:38.296266 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.296360 kubelet[2138]: E0212 21:52:38.296350 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.296360 kubelet[2138]: W0212 21:52:38.296356 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.296416 kubelet[2138]: E0212 21:52:38.296363 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.296575 kubelet[2138]: E0212 21:52:38.296560 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.296575 kubelet[2138]: W0212 21:52:38.296569 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.296644 kubelet[2138]: E0212 21:52:38.296579 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.296751 kubelet[2138]: E0212 21:52:38.296742 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.296751 kubelet[2138]: W0212 21:52:38.296749 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.296806 kubelet[2138]: E0212 21:52:38.296757 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.297449 kubelet[2138]: E0212 21:52:38.297438 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.297485 kubelet[2138]: W0212 21:52:38.297448 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.297583 kubelet[2138]: E0212 21:52:38.297518 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.297630 kubelet[2138]: E0212 21:52:38.297621 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.297630 kubelet[2138]: W0212 21:52:38.297626 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.297676 kubelet[2138]: E0212 21:52:38.297669 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.298008 kubelet[2138]: E0212 21:52:38.297989 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.298008 kubelet[2138]: W0212 21:52:38.298006 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.298076 kubelet[2138]: E0212 21:52:38.298058 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.298168 kubelet[2138]: E0212 21:52:38.298159 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.298168 kubelet[2138]: W0212 21:52:38.298167 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.298228 kubelet[2138]: E0212 21:52:38.298213 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.298317 kubelet[2138]: E0212 21:52:38.298309 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.298317 kubelet[2138]: W0212 21:52:38.298314 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.298373 kubelet[2138]: E0212 21:52:38.298355 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.298455 kubelet[2138]: E0212 21:52:38.298447 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.298455 kubelet[2138]: W0212 21:52:38.298453 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.298514 kubelet[2138]: E0212 21:52:38.298461 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.298619 kubelet[2138]: E0212 21:52:38.298612 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.298619 kubelet[2138]: W0212 21:52:38.298618 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.298668 kubelet[2138]: E0212 21:52:38.298626 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.298902 kubelet[2138]: E0212 21:52:38.298891 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.298902 kubelet[2138]: W0212 21:52:38.298897 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.298902 kubelet[2138]: E0212 21:52:38.298906 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.299748 kubelet[2138]: E0212 21:52:38.299740 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.299748 kubelet[2138]: W0212 21:52:38.299747 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.299802 kubelet[2138]: E0212 21:52:38.299757 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.299906 kubelet[2138]: E0212 21:52:38.299896 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.299906 kubelet[2138]: W0212 21:52:38.299903 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.299960 kubelet[2138]: E0212 21:52:38.299916 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300034 kubelet[2138]: E0212 21:52:38.300025 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300034 kubelet[2138]: W0212 21:52:38.300032 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300092 kubelet[2138]: E0212 21:52:38.300047 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300184 kubelet[2138]: E0212 21:52:38.300175 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300184 kubelet[2138]: W0212 21:52:38.300181 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300239 kubelet[2138]: E0212 21:52:38.300223 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300327 kubelet[2138]: E0212 21:52:38.300319 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300327 kubelet[2138]: W0212 21:52:38.300326 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300388 kubelet[2138]: E0212 21:52:38.300369 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300492 kubelet[2138]: E0212 21:52:38.300484 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300492 kubelet[2138]: W0212 21:52:38.300490 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300594 kubelet[2138]: E0212 21:52:38.300586 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300650 kubelet[2138]: E0212 21:52:38.300641 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300650 kubelet[2138]: W0212 21:52:38.300647 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300707 kubelet[2138]: E0212 21:52:38.300660 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300754 kubelet[2138]: E0212 21:52:38.300745 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300754 kubelet[2138]: W0212 21:52:38.300751 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300813 kubelet[2138]: E0212 21:52:38.300761 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.300847 kubelet[2138]: E0212 21:52:38.300839 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.300847 kubelet[2138]: W0212 21:52:38.300844 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.300891 kubelet[2138]: E0212 21:52:38.300850 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.306447 kubelet[2138]: E0212 21:52:38.304801 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.306447 kubelet[2138]: W0212 21:52:38.304812 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.306447 kubelet[2138]: E0212 21:52:38.304824 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.306939 kubelet[2138]: E0212 21:52:38.306927 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:38.306939 kubelet[2138]: W0212 21:52:38.306937 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:38.307004 kubelet[2138]: E0212 21:52:38.306949 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:38.687000 audit[2658]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:38.691658 kernel: kauditd_printk_skb: 489 callbacks suppressed Feb 12 21:52:38.691701 kernel: audit: type=1325 audit(1707774758.687:1099): table=filter:95 family=2 entries=16 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:38.687000 audit[2658]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff04313620 a2=0 a3=7fff0431360c items=0 ppid=2312 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:38.699240 kernel: audit: type=1300 audit(1707774758.687:1099): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff04313620 a2=0 a3=7fff0431360c items=0 ppid=2312 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.699280 kernel: audit: type=1327 audit(1707774758.687:1099): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:38.699295 kernel: audit: type=1325 audit(1707774758.697:1100): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:38.697000 audit[2658]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:38.701121 kernel: audit: type=1300 audit(1707774758.697:1100): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff04313620 a2=0 a3=31030 items=0 ppid=2312 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.697000 audit[2658]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff04313620 a2=0 a3=31030 items=0 ppid=2312 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:38.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:38.706820 kernel: audit: type=1327 audit(1707774758.697:1100): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:39.716211 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1507974184.mount: Deactivated successfully. Feb 12 21:52:40.015946 kubelet[2138]: E0212 21:52:40.015632 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:40.752533 env[1158]: time="2024-02-12T21:52:40.752499856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:40.753300 env[1158]: time="2024-02-12T21:52:40.753283406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:40.754417 env[1158]: time="2024-02-12T21:52:40.754404758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:40.755532 env[1158]: time="2024-02-12T21:52:40.755511688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:40.756084 env[1158]: time="2024-02-12T21:52:40.756067534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 21:52:40.756378 env[1158]: time="2024-02-12T21:52:40.756366359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 21:52:40.764815 env[1158]: time="2024-02-12T21:52:40.764789012Z" level=info msg="CreateContainer within sandbox \"cf1f119ce8b899b830221dada9076c1121f6db901bd1f402e854bcc4cbc9e58f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 21:52:40.769512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount216269785.mount: Deactivated successfully. Feb 12 21:52:40.780047 env[1158]: time="2024-02-12T21:52:40.780012875Z" level=info msg="CreateContainer within sandbox \"cf1f119ce8b899b830221dada9076c1121f6db901bd1f402e854bcc4cbc9e58f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"45b0e478d32cf916f82acc68da104262bdd302662f29ab1b3b92c6842f58ed79\"" Feb 12 21:52:40.780778 env[1158]: time="2024-02-12T21:52:40.780760024Z" level=info msg="StartContainer for \"45b0e478d32cf916f82acc68da104262bdd302662f29ab1b3b92c6842f58ed79\"" Feb 12 21:52:40.799331 systemd[1]: Started cri-containerd-45b0e478d32cf916f82acc68da104262bdd302662f29ab1b3b92c6842f58ed79.scope. Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.819090 kernel: audit: type=1400 audit(1707774760.813:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.819131 kernel: audit: type=1400 audit(1707774760.813:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.821886 kernel: audit: type=1400 audit(1707774760.813:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.824647 kernel: audit: type=1400 audit(1707774760.813:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.816000 audit: BPF prog-id=129 op=LOAD Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2540 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:40.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623065343738643332636639313666383261636336386461313034 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2540 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:40.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623065343738643332636639313666383261636336386461313034 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit: BPF prog-id=130 op=LOAD Feb 12 21:52:40.818000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021afe0 items=0 ppid=2540 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:40.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623065343738643332636639313666383261636336386461313034 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit: BPF prog-id=131 op=LOAD Feb 12 21:52:40.818000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b028 items=0 ppid=2540 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:40.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623065343738643332636639313666383261636336386461313034 Feb 12 21:52:40.818000 audit: BPF prog-id=131 op=UNLOAD Feb 12 21:52:40.818000 audit: BPF prog-id=130 op=UNLOAD Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:40.818000 audit: BPF prog-id=132 op=LOAD Feb 12 21:52:40.818000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021b438 items=0 ppid=2540 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:40.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623065343738643332636639313666383261636336386461313034 Feb 12 21:52:40.854816 env[1158]: time="2024-02-12T21:52:40.854785701Z" level=info msg="StartContainer for \"45b0e478d32cf916f82acc68da104262bdd302662f29ab1b3b92c6842f58ed79\" returns successfully" Feb 12 21:52:41.135259 kubelet[2138]: E0212 21:52:41.135184 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.135259 kubelet[2138]: W0212 21:52:41.135196 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.135259 kubelet[2138]: E0212 21:52:41.135209 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.135699 kubelet[2138]: E0212 21:52:41.135643 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.135699 kubelet[2138]: W0212 21:52:41.135649 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.135699 kubelet[2138]: E0212 21:52:41.135657 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.135868 kubelet[2138]: E0212 21:52:41.135801 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.135868 kubelet[2138]: W0212 21:52:41.135806 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.135868 kubelet[2138]: E0212 21:52:41.135812 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136011 kubelet[2138]: E0212 21:52:41.135964 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136011 kubelet[2138]: W0212 21:52:41.135970 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136011 kubelet[2138]: E0212 21:52:41.135976 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136173 kubelet[2138]: E0212 21:52:41.136111 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136173 kubelet[2138]: W0212 21:52:41.136116 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136173 kubelet[2138]: E0212 21:52:41.136122 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136341 kubelet[2138]: E0212 21:52:41.136267 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136341 kubelet[2138]: W0212 21:52:41.136273 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136341 kubelet[2138]: E0212 21:52:41.136280 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136499 kubelet[2138]: E0212 21:52:41.136451 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136499 kubelet[2138]: W0212 21:52:41.136456 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136499 kubelet[2138]: E0212 21:52:41.136463 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136651 kubelet[2138]: E0212 21:52:41.136605 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136651 kubelet[2138]: W0212 21:52:41.136611 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136651 kubelet[2138]: E0212 21:52:41.136617 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136801 kubelet[2138]: E0212 21:52:41.136748 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136801 kubelet[2138]: W0212 21:52:41.136754 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136801 kubelet[2138]: E0212 21:52:41.136760 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.136948 kubelet[2138]: E0212 21:52:41.136900 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.136948 kubelet[2138]: W0212 21:52:41.136906 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.136948 kubelet[2138]: E0212 21:52:41.136912 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.137094 kubelet[2138]: E0212 21:52:41.137046 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.137094 kubelet[2138]: W0212 21:52:41.137051 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.137094 kubelet[2138]: E0212 21:52:41.137057 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.137221 kubelet[2138]: E0212 21:52:41.137186 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.137221 kubelet[2138]: W0212 21:52:41.137191 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.137221 kubelet[2138]: E0212 21:52:41.137197 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.219493 kubelet[2138]: E0212 21:52:41.219476 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.219643 kubelet[2138]: W0212 21:52:41.219633 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.219701 kubelet[2138]: E0212 21:52:41.219692 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.219894 kubelet[2138]: E0212 21:52:41.219887 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.219939 kubelet[2138]: W0212 21:52:41.219931 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.219990 kubelet[2138]: E0212 21:52:41.219983 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.220145 kubelet[2138]: E0212 21:52:41.220139 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.220189 kubelet[2138]: W0212 21:52:41.220181 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.220239 kubelet[2138]: E0212 21:52:41.220232 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.220386 kubelet[2138]: E0212 21:52:41.220380 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.220430 kubelet[2138]: W0212 21:52:41.220423 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.220480 kubelet[2138]: E0212 21:52:41.220474 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.220645 kubelet[2138]: E0212 21:52:41.220632 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.220645 kubelet[2138]: W0212 21:52:41.220642 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.220699 kubelet[2138]: E0212 21:52:41.220654 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.220742 kubelet[2138]: E0212 21:52:41.220731 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.220742 kubelet[2138]: W0212 21:52:41.220739 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.220801 kubelet[2138]: E0212 21:52:41.220745 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.220828 kubelet[2138]: E0212 21:52:41.220808 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.220828 kubelet[2138]: W0212 21:52:41.220812 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.220828 kubelet[2138]: E0212 21:52:41.220818 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.220902 kubelet[2138]: E0212 21:52:41.220891 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.220902 kubelet[2138]: W0212 21:52:41.220899 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.220954 kubelet[2138]: E0212 21:52:41.220907 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221087 kubelet[2138]: E0212 21:52:41.221077 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221117 kubelet[2138]: W0212 21:52:41.221084 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221117 kubelet[2138]: E0212 21:52:41.221097 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221186 kubelet[2138]: E0212 21:52:41.221176 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221186 kubelet[2138]: W0212 21:52:41.221183 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221229 kubelet[2138]: E0212 21:52:41.221193 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221271 kubelet[2138]: E0212 21:52:41.221261 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221271 kubelet[2138]: W0212 21:52:41.221268 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221328 kubelet[2138]: E0212 21:52:41.221273 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221352 kubelet[2138]: E0212 21:52:41.221337 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221352 kubelet[2138]: W0212 21:52:41.221341 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221352 kubelet[2138]: E0212 21:52:41.221346 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221419 kubelet[2138]: E0212 21:52:41.221414 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221419 kubelet[2138]: W0212 21:52:41.221417 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221457 kubelet[2138]: E0212 21:52:41.221423 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221581 kubelet[2138]: E0212 21:52:41.221575 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221636 kubelet[2138]: W0212 21:52:41.221629 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221687 kubelet[2138]: E0212 21:52:41.221680 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.221816 kubelet[2138]: E0212 21:52:41.221809 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.221867 kubelet[2138]: W0212 21:52:41.221859 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.221919 kubelet[2138]: E0212 21:52:41.221913 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.222060 kubelet[2138]: E0212 21:52:41.222053 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.222106 kubelet[2138]: W0212 21:52:41.222099 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.222155 kubelet[2138]: E0212 21:52:41.222149 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.222232 kubelet[2138]: E0212 21:52:41.222221 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.222232 kubelet[2138]: W0212 21:52:41.222228 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.222281 kubelet[2138]: E0212 21:52:41.222234 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:41.222514 kubelet[2138]: E0212 21:52:41.222508 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:41.222574 kubelet[2138]: W0212 21:52:41.222566 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:41.222621 kubelet[2138]: E0212 21:52:41.222614 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.015747 kubelet[2138]: E0212 21:52:42.015648 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:42.071398 kubelet[2138]: I0212 21:52:42.071377 2138 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 21:52:42.141353 kubelet[2138]: E0212 21:52:42.141331 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.141353 kubelet[2138]: W0212 21:52:42.141347 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.141633 kubelet[2138]: E0212 21:52:42.141364 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.141633 kubelet[2138]: E0212 21:52:42.141479 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.141633 kubelet[2138]: W0212 21:52:42.141485 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.141633 kubelet[2138]: E0212 21:52:42.141494 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.141633 kubelet[2138]: E0212 21:52:42.141604 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.141633 kubelet[2138]: W0212 21:52:42.141609 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.141633 kubelet[2138]: E0212 21:52:42.141617 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.141812 kubelet[2138]: E0212 21:52:42.141729 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.141812 kubelet[2138]: W0212 21:52:42.141735 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.141812 kubelet[2138]: E0212 21:52:42.141742 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.141886 kubelet[2138]: E0212 21:52:42.141829 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.141886 kubelet[2138]: W0212 21:52:42.141834 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.141886 kubelet[2138]: E0212 21:52:42.141842 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.141959 kubelet[2138]: E0212 21:52:42.141926 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.141959 kubelet[2138]: W0212 21:52:42.141931 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.141959 kubelet[2138]: E0212 21:52:42.141939 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.142074 kubelet[2138]: E0212 21:52:42.142066 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.142074 kubelet[2138]: W0212 21:52:42.142072 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.142127 kubelet[2138]: E0212 21:52:42.142079 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.142179 kubelet[2138]: E0212 21:52:42.142165 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.142179 kubelet[2138]: W0212 21:52:42.142173 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.142179 kubelet[2138]: E0212 21:52:42.142181 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.142273 kubelet[2138]: E0212 21:52:42.142266 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.142273 kubelet[2138]: W0212 21:52:42.142271 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.142324 kubelet[2138]: E0212 21:52:42.142278 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.142380 kubelet[2138]: E0212 21:52:42.142367 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.142380 kubelet[2138]: W0212 21:52:42.142374 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.142380 kubelet[2138]: E0212 21:52:42.142382 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.142471 kubelet[2138]: E0212 21:52:42.142467 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.142496 kubelet[2138]: W0212 21:52:42.142472 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.142496 kubelet[2138]: E0212 21:52:42.142479 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.142590 kubelet[2138]: E0212 21:52:42.142578 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.142590 kubelet[2138]: W0212 21:52:42.142586 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.142685 kubelet[2138]: E0212 21:52:42.142593 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.148131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1377581422.mount: Deactivated successfully. Feb 12 21:52:42.225713 kubelet[2138]: E0212 21:52:42.225694 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.225713 kubelet[2138]: W0212 21:52:42.225707 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.225850 kubelet[2138]: E0212 21:52:42.225721 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.225850 kubelet[2138]: E0212 21:52:42.225834 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.225850 kubelet[2138]: W0212 21:52:42.225845 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.225910 kubelet[2138]: E0212 21:52:42.225854 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.225965 kubelet[2138]: E0212 21:52:42.225952 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.225994 kubelet[2138]: W0212 21:52:42.225967 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.225994 kubelet[2138]: E0212 21:52:42.225976 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226095 kubelet[2138]: E0212 21:52:42.226084 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226095 kubelet[2138]: W0212 21:52:42.226092 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.226134 kubelet[2138]: E0212 21:52:42.226099 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226199 kubelet[2138]: E0212 21:52:42.226190 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226199 kubelet[2138]: W0212 21:52:42.226197 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.226239 kubelet[2138]: E0212 21:52:42.226204 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226303 kubelet[2138]: E0212 21:52:42.226292 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226303 kubelet[2138]: W0212 21:52:42.226300 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.226346 kubelet[2138]: E0212 21:52:42.226308 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226438 kubelet[2138]: E0212 21:52:42.226428 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226438 kubelet[2138]: W0212 21:52:42.226435 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.226487 kubelet[2138]: E0212 21:52:42.226442 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226639 kubelet[2138]: E0212 21:52:42.226628 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226639 kubelet[2138]: W0212 21:52:42.226636 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.226689 kubelet[2138]: E0212 21:52:42.226644 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226796 kubelet[2138]: E0212 21:52:42.226783 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226796 kubelet[2138]: W0212 21:52:42.226792 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.226846 kubelet[2138]: E0212 21:52:42.226800 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.226942 kubelet[2138]: E0212 21:52:42.226931 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.226942 kubelet[2138]: W0212 21:52:42.226938 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.227001 kubelet[2138]: E0212 21:52:42.226944 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.227069 kubelet[2138]: E0212 21:52:42.227059 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.227069 kubelet[2138]: W0212 21:52:42.227065 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.227126 kubelet[2138]: E0212 21:52:42.227091 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.227258 kubelet[2138]: E0212 21:52:42.227246 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.227682 kubelet[2138]: W0212 21:52:42.227669 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.227715 kubelet[2138]: E0212 21:52:42.227707 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.228239 kubelet[2138]: E0212 21:52:42.228228 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.228239 kubelet[2138]: W0212 21:52:42.228236 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.228291 kubelet[2138]: E0212 21:52:42.228245 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.228380 kubelet[2138]: E0212 21:52:42.228370 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.228380 kubelet[2138]: W0212 21:52:42.228377 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.228429 kubelet[2138]: E0212 21:52:42.228414 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.228506 kubelet[2138]: E0212 21:52:42.228497 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.228506 kubelet[2138]: W0212 21:52:42.228503 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.228576 kubelet[2138]: E0212 21:52:42.228511 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.228658 kubelet[2138]: E0212 21:52:42.228647 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.228658 kubelet[2138]: W0212 21:52:42.228654 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.228735 kubelet[2138]: E0212 21:52:42.228660 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.228814 kubelet[2138]: E0212 21:52:42.228804 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.228814 kubelet[2138]: W0212 21:52:42.228811 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.228862 kubelet[2138]: E0212 21:52:42.228816 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.228980 kubelet[2138]: E0212 21:52:42.228969 2138 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:52:42.228980 kubelet[2138]: W0212 21:52:42.228976 2138 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:52:42.229029 kubelet[2138]: E0212 21:52:42.228982 2138 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:52:42.946457 env[1158]: time="2024-02-12T21:52:42.946426353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:42.947337 env[1158]: time="2024-02-12T21:52:42.947321023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:42.948529 env[1158]: time="2024-02-12T21:52:42.948508751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:42.949704 env[1158]: time="2024-02-12T21:52:42.949689306Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:42.950283 env[1158]: time="2024-02-12T21:52:42.950267507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 21:52:42.952244 env[1158]: time="2024-02-12T21:52:42.952091402Z" level=info msg="CreateContainer within sandbox \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 21:52:42.957421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3871312204.mount: Deactivated successfully. Feb 12 21:52:42.970303 env[1158]: time="2024-02-12T21:52:42.970281703Z" level=info msg="CreateContainer within sandbox \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a\"" Feb 12 21:52:42.970680 env[1158]: time="2024-02-12T21:52:42.970664931Z" level=info msg="StartContainer for \"2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a\"" Feb 12 21:52:42.993998 systemd[1]: Started cri-containerd-2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a.scope. Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f80d87654d8 items=0 ppid=2587 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:43.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303737646134626339323564363032656433626461363461396136 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit: BPF prog-id=133 op=LOAD Feb 12 21:52:43.004000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002983d8 items=0 ppid=2587 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:43.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303737646134626339323564363032656433626461363461396136 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.004000 audit: BPF prog-id=134 op=LOAD Feb 12 21:52:43.004000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298428 items=0 ppid=2587 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:43.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303737646134626339323564363032656433626461363461396136 Feb 12 21:52:43.005000 audit: BPF prog-id=134 op=UNLOAD Feb 12 21:52:43.005000 audit: BPF prog-id=133 op=UNLOAD Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:43.005000 audit: BPF prog-id=135 op=LOAD Feb 12 21:52:43.005000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002984b8 items=0 ppid=2587 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:43.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303737646134626339323564363032656433626461363461396136 Feb 12 21:52:43.013608 env[1158]: time="2024-02-12T21:52:43.013578352Z" level=info msg="StartContainer for \"2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a\" returns successfully" Feb 12 21:52:43.021630 systemd[1]: cri-containerd-2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a.scope: Deactivated successfully. Feb 12 21:52:43.026000 audit: BPF prog-id=135 op=UNLOAD Feb 12 21:52:43.081998 kubelet[2138]: I0212 21:52:43.081976 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5bf557765b-6pwwl" podStartSLOduration=3.564621251 podCreationTimestamp="2024-02-12 21:52:37 +0000 UTC" firstStartedPulling="2024-02-12 21:52:38.238963567 +0000 UTC m=+18.349520340" lastFinishedPulling="2024-02-12 21:52:40.756288556 +0000 UTC m=+20.866845329" observedRunningTime="2024-02-12 21:52:41.075609713 +0000 UTC m=+21.186166491" watchObservedRunningTime="2024-02-12 21:52:43.08194624 +0000 UTC m=+23.192503019" Feb 12 21:52:43.143627 env[1158]: time="2024-02-12T21:52:43.143595838Z" level=info msg="shim disconnected" id=2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a Feb 12 21:52:43.143627 env[1158]: time="2024-02-12T21:52:43.143622647Z" level=warning msg="cleaning up after shim disconnected" id=2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a namespace=k8s.io Feb 12 21:52:43.143627 env[1158]: time="2024-02-12T21:52:43.143629832Z" level=info msg="cleaning up dead shim" Feb 12 21:52:43.148971 env[1158]: time="2024-02-12T21:52:43.148944529Z" level=warning msg="cleanup warnings time=\"2024-02-12T21:52:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2807 runtime=io.containerd.runc.v2\n" Feb 12 21:52:43.957009 systemd[1]: run-containerd-runc-k8s.io-2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a-runc.Dp5Y2o.mount: Deactivated successfully. Feb 12 21:52:43.957069 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2a077da4bc925d602ed3bda64a9a6559a9ccfb666a5eeca91edd13a95605bc7a-rootfs.mount: Deactivated successfully. Feb 12 21:52:44.016203 kubelet[2138]: E0212 21:52:44.016179 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:44.076736 env[1158]: time="2024-02-12T21:52:44.076710763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 21:52:45.557415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1411913756.mount: Deactivated successfully. Feb 12 21:52:46.016886 kubelet[2138]: E0212 21:52:46.016082 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:48.015228 kubelet[2138]: E0212 21:52:48.015210 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:48.211125 env[1158]: time="2024-02-12T21:52:48.211097502Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:48.212805 env[1158]: time="2024-02-12T21:52:48.212787912Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:48.214457 env[1158]: time="2024-02-12T21:52:48.214441668Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:48.216055 env[1158]: time="2024-02-12T21:52:48.216038703Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:48.216742 env[1158]: time="2024-02-12T21:52:48.216723927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 21:52:48.221078 env[1158]: time="2024-02-12T21:52:48.221055144Z" level=info msg="CreateContainer within sandbox \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 21:52:48.226845 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount425178442.mount: Deactivated successfully. Feb 12 21:52:48.238601 env[1158]: time="2024-02-12T21:52:48.238579893Z" level=info msg="CreateContainer within sandbox \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f\"" Feb 12 21:52:48.240358 env[1158]: time="2024-02-12T21:52:48.239542023Z" level=info msg="StartContainer for \"5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f\"" Feb 12 21:52:48.254198 systemd[1]: Started cri-containerd-5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f.scope. Feb 12 21:52:48.256618 systemd[1]: run-containerd-runc-k8s.io-5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f-runc.GA0ZzZ.mount: Deactivated successfully. Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270920 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 12 21:52:48.270966 kernel: audit: type=1400 audit(1707774768.267:1126): avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f26090e9198 items=0 ppid=2587 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:48.274826 kernel: audit: type=1300 audit(1707774768.267:1126): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f26090e9198 items=0 ppid=2587 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:48.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539363261613963346234326139656261623265363136343262316535 Feb 12 21:52:48.278157 kernel: audit: type=1327 audit(1707774768.267:1126): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539363261613963346234326139656261623265363136343262316535 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.280700 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.287110 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.287148 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.295420 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.295453 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.295468 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.300164 kernel: audit: type=1400 audit(1707774768.267:1127): avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.267000 audit: BPF prog-id=136 op=LOAD Feb 12 21:52:48.267000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cdc88 items=0 ppid=2587 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:48.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539363261613963346234326139656261623265363136343262316535 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.270000 audit: BPF prog-id=137 op=LOAD Feb 12 21:52:48.270000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002cdcd8 items=0 ppid=2587 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:48.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539363261613963346234326139656261623265363136343262316535 Feb 12 21:52:48.274000 audit: BPF prog-id=137 op=UNLOAD Feb 12 21:52:48.274000 audit: BPF prog-id=136 op=UNLOAD Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:48.274000 audit: BPF prog-id=138 op=LOAD Feb 12 21:52:48.274000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002cdd68 items=0 ppid=2587 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:48.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539363261613963346234326139656261623265363136343262316535 Feb 12 21:52:48.357254 env[1158]: time="2024-02-12T21:52:48.357216501Z" level=info msg="StartContainer for \"5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f\" returns successfully" Feb 12 21:52:49.690489 systemd[1]: cri-containerd-5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f.scope: Deactivated successfully. Feb 12 21:52:49.696000 audit: BPF prog-id=138 op=UNLOAD Feb 12 21:52:49.706154 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f-rootfs.mount: Deactivated successfully. Feb 12 21:52:49.711576 env[1158]: time="2024-02-12T21:52:49.711507504Z" level=info msg="shim disconnected" id=5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f Feb 12 21:52:49.712164 env[1158]: time="2024-02-12T21:52:49.712151461Z" level=warning msg="cleaning up after shim disconnected" id=5962aa9c4b42a9ebab2e61642b1e5ab101ebb7998f9b7c7d328bd5a054dc0c1f namespace=k8s.io Feb 12 21:52:49.712211 env[1158]: time="2024-02-12T21:52:49.712201350Z" level=info msg="cleaning up dead shim" Feb 12 21:52:49.713117 kubelet[2138]: I0212 21:52:49.713102 2138 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 21:52:49.719421 env[1158]: time="2024-02-12T21:52:49.718002329Z" level=warning msg="cleanup warnings time=\"2024-02-12T21:52:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2875 runtime=io.containerd.runc.v2\ntime=\"2024-02-12T21:52:49Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Feb 12 21:52:49.767949 kubelet[2138]: I0212 21:52:49.767920 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:49.787215 kubelet[2138]: I0212 21:52:49.787194 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:49.787305 kubelet[2138]: I0212 21:52:49.787268 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:52:49.801952 systemd[1]: Created slice kubepods-burstable-pod618de89e_7370_42a2_847f_c1efb737a382.slice. Feb 12 21:52:49.805144 systemd[1]: Created slice kubepods-burstable-pod9131c643_285c_4cf7_a0e3_e658400fe3fb.slice. Feb 12 21:52:49.808081 systemd[1]: Created slice kubepods-besteffort-pod877f0f06_db90_4f12_bb09_4607c2419e0f.slice. Feb 12 21:52:49.886813 kubelet[2138]: I0212 21:52:49.886788 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/618de89e-7370-42a2-847f-c1efb737a382-config-volume\") pod \"coredns-5d78c9869d-84mjx\" (UID: \"618de89e-7370-42a2-847f-c1efb737a382\") " pod="kube-system/coredns-5d78c9869d-84mjx" Feb 12 21:52:49.887080 kubelet[2138]: I0212 21:52:49.887070 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/877f0f06-db90-4f12-bb09-4607c2419e0f-tigera-ca-bundle\") pod \"calico-kube-controllers-74b44b4558-2dbmc\" (UID: \"877f0f06-db90-4f12-bb09-4607c2419e0f\") " pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" Feb 12 21:52:49.887160 kubelet[2138]: I0212 21:52:49.887150 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8c2r8\" (UniqueName: \"kubernetes.io/projected/618de89e-7370-42a2-847f-c1efb737a382-kube-api-access-8c2r8\") pod \"coredns-5d78c9869d-84mjx\" (UID: \"618de89e-7370-42a2-847f-c1efb737a382\") " pod="kube-system/coredns-5d78c9869d-84mjx" Feb 12 21:52:49.887242 kubelet[2138]: I0212 21:52:49.887232 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-glvwc\" (UniqueName: \"kubernetes.io/projected/9131c643-285c-4cf7-a0e3-e658400fe3fb-kube-api-access-glvwc\") pod \"coredns-5d78c9869d-sg6fd\" (UID: \"9131c643-285c-4cf7-a0e3-e658400fe3fb\") " pod="kube-system/coredns-5d78c9869d-sg6fd" Feb 12 21:52:49.887320 kubelet[2138]: I0212 21:52:49.887309 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5542l\" (UniqueName: \"kubernetes.io/projected/877f0f06-db90-4f12-bb09-4607c2419e0f-kube-api-access-5542l\") pod \"calico-kube-controllers-74b44b4558-2dbmc\" (UID: \"877f0f06-db90-4f12-bb09-4607c2419e0f\") " pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" Feb 12 21:52:49.887395 kubelet[2138]: I0212 21:52:49.887386 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9131c643-285c-4cf7-a0e3-e658400fe3fb-config-volume\") pod \"coredns-5d78c9869d-sg6fd\" (UID: \"9131c643-285c-4cf7-a0e3-e658400fe3fb\") " pod="kube-system/coredns-5d78c9869d-sg6fd" Feb 12 21:52:50.019422 systemd[1]: Created slice kubepods-besteffort-podf72389d7_6cf4_48b0_afb1_b2ab2d4789f1.slice. Feb 12 21:52:50.022163 env[1158]: time="2024-02-12T21:52:50.021970099Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hlb9m,Uid:f72389d7-6cf4-48b0-afb1-b2ab2d4789f1,Namespace:calico-system,Attempt:0,}" Feb 12 21:52:50.080976 env[1158]: time="2024-02-12T21:52:50.080932378Z" level=error msg="Failed to destroy network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.081308 env[1158]: time="2024-02-12T21:52:50.081286124Z" level=error msg="encountered an error cleaning up failed sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.081400 env[1158]: time="2024-02-12T21:52:50.081380461Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hlb9m,Uid:f72389d7-6cf4-48b0-afb1-b2ab2d4789f1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.083425 kubelet[2138]: E0212 21:52:50.083408 2138 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.084950 kubelet[2138]: E0212 21:52:50.084937 2138 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:50.084996 kubelet[2138]: E0212 21:52:50.084959 2138 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hlb9m" Feb 12 21:52:50.085028 kubelet[2138]: E0212 21:52:50.084997 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hlb9m_calico-system(f72389d7-6cf4-48b0-afb1-b2ab2d4789f1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hlb9m_calico-system(f72389d7-6cf4-48b0-afb1-b2ab2d4789f1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:50.090001 kubelet[2138]: I0212 21:52:50.089979 2138 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:52:50.095277 env[1158]: time="2024-02-12T21:52:50.095246888Z" level=info msg="StopPodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\"" Feb 12 21:52:50.104081 env[1158]: time="2024-02-12T21:52:50.104060738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-84mjx,Uid:618de89e-7370-42a2-847f-c1efb737a382,Namespace:kube-system,Attempt:0,}" Feb 12 21:52:50.104508 env[1158]: time="2024-02-12T21:52:50.104234386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 21:52:50.109685 env[1158]: time="2024-02-12T21:52:50.109661328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-sg6fd,Uid:9131c643-285c-4cf7-a0e3-e658400fe3fb,Namespace:kube-system,Attempt:0,}" Feb 12 21:52:50.110233 env[1158]: time="2024-02-12T21:52:50.110217013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b44b4558-2dbmc,Uid:877f0f06-db90-4f12-bb09-4607c2419e0f,Namespace:calico-system,Attempt:0,}" Feb 12 21:52:50.130994 env[1158]: time="2024-02-12T21:52:50.130941447Z" level=error msg="StopPodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" failed" error="failed to destroy network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.131264 kubelet[2138]: E0212 21:52:50.131205 2138 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:52:50.131481 kubelet[2138]: E0212 21:52:50.131414 2138 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d} Feb 12 21:52:50.131481 kubelet[2138]: E0212 21:52:50.131441 2138 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 21:52:50.131481 kubelet[2138]: E0212 21:52:50.131461 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hlb9m" podUID=f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 Feb 12 21:52:50.160094 env[1158]: time="2024-02-12T21:52:50.160060186Z" level=error msg="Failed to destroy network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.160457 env[1158]: time="2024-02-12T21:52:50.160439927Z" level=error msg="encountered an error cleaning up failed sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.160545 env[1158]: time="2024-02-12T21:52:50.160522259Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-84mjx,Uid:618de89e-7370-42a2-847f-c1efb737a382,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.160978 kubelet[2138]: E0212 21:52:50.160738 2138 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.160978 kubelet[2138]: E0212 21:52:50.160768 2138 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-84mjx" Feb 12 21:52:50.160978 kubelet[2138]: E0212 21:52:50.160782 2138 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-84mjx" Feb 12 21:52:50.161101 kubelet[2138]: E0212 21:52:50.160827 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-84mjx_kube-system(618de89e-7370-42a2-847f-c1efb737a382)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-84mjx_kube-system(618de89e-7370-42a2-847f-c1efb737a382)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-84mjx" podUID=618de89e-7370-42a2-847f-c1efb737a382 Feb 12 21:52:50.177999 env[1158]: time="2024-02-12T21:52:50.177946593Z" level=error msg="Failed to destroy network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.178247 env[1158]: time="2024-02-12T21:52:50.178227153Z" level=error msg="encountered an error cleaning up failed sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.178280 env[1158]: time="2024-02-12T21:52:50.178262694Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b44b4558-2dbmc,Uid:877f0f06-db90-4f12-bb09-4607c2419e0f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.178639 kubelet[2138]: E0212 21:52:50.178414 2138 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.178639 kubelet[2138]: E0212 21:52:50.178445 2138 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" Feb 12 21:52:50.178639 kubelet[2138]: E0212 21:52:50.178464 2138 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" Feb 12 21:52:50.178774 kubelet[2138]: E0212 21:52:50.178495 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b44b4558-2dbmc_calico-system(877f0f06-db90-4f12-bb09-4607c2419e0f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b44b4558-2dbmc_calico-system(877f0f06-db90-4f12-bb09-4607c2419e0f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" podUID=877f0f06-db90-4f12-bb09-4607c2419e0f Feb 12 21:52:50.185284 env[1158]: time="2024-02-12T21:52:50.185253586Z" level=error msg="Failed to destroy network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.185482 env[1158]: time="2024-02-12T21:52:50.185463477Z" level=error msg="encountered an error cleaning up failed sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.185520 env[1158]: time="2024-02-12T21:52:50.185493878Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-sg6fd,Uid:9131c643-285c-4cf7-a0e3-e658400fe3fb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.186325 kubelet[2138]: E0212 21:52:50.185623 2138 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:50.186325 kubelet[2138]: E0212 21:52:50.185661 2138 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-sg6fd" Feb 12 21:52:50.186325 kubelet[2138]: E0212 21:52:50.185676 2138 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-sg6fd" Feb 12 21:52:50.186433 kubelet[2138]: E0212 21:52:50.185704 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-sg6fd_kube-system(9131c643-285c-4cf7-a0e3-e658400fe3fb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-sg6fd_kube-system(9131c643-285c-4cf7-a0e3-e658400fe3fb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-sg6fd" podUID=9131c643-285c-4cf7-a0e3-e658400fe3fb Feb 12 21:52:50.288911 kubelet[2138]: I0212 21:52:50.287568 2138 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 21:52:50.320000 audit[3040]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:50.320000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe5b975c30 a2=0 a3=7ffe5b975c1c items=0 ppid=2312 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:50.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:50.320000 audit[3040]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:52:50.320000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffe5b975c30 a2=0 a3=7ffe5b975c1c items=0 ppid=2312 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:50.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:52:50.707420 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d-shm.mount: Deactivated successfully. Feb 12 21:52:51.098976 kubelet[2138]: I0212 21:52:51.098960 2138 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:52:51.099706 env[1158]: time="2024-02-12T21:52:51.099683423Z" level=info msg="StopPodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\"" Feb 12 21:52:51.101148 kubelet[2138]: I0212 21:52:51.101135 2138 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:52:51.101566 env[1158]: time="2024-02-12T21:52:51.101488916Z" level=info msg="StopPodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\"" Feb 12 21:52:51.102552 kubelet[2138]: I0212 21:52:51.102541 2138 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:52:51.102917 env[1158]: time="2024-02-12T21:52:51.102873352Z" level=info msg="StopPodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\"" Feb 12 21:52:51.121649 env[1158]: time="2024-02-12T21:52:51.121611832Z" level=error msg="StopPodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" failed" error="failed to destroy network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:51.121912 kubelet[2138]: E0212 21:52:51.121825 2138 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:52:51.121912 kubelet[2138]: E0212 21:52:51.121849 2138 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42} Feb 12 21:52:51.121912 kubelet[2138]: E0212 21:52:51.121872 2138 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"877f0f06-db90-4f12-bb09-4607c2419e0f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 21:52:51.121912 kubelet[2138]: E0212 21:52:51.121889 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"877f0f06-db90-4f12-bb09-4607c2419e0f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" podUID=877f0f06-db90-4f12-bb09-4607c2419e0f Feb 12 21:52:51.122596 env[1158]: time="2024-02-12T21:52:51.122568450Z" level=error msg="StopPodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" failed" error="failed to destroy network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:51.122761 kubelet[2138]: E0212 21:52:51.122685 2138 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:52:51.122761 kubelet[2138]: E0212 21:52:51.122698 2138 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e} Feb 12 21:52:51.122761 kubelet[2138]: E0212 21:52:51.122734 2138 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"618de89e-7370-42a2-847f-c1efb737a382\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 21:52:51.122761 kubelet[2138]: E0212 21:52:51.122749 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"618de89e-7370-42a2-847f-c1efb737a382\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-84mjx" podUID=618de89e-7370-42a2-847f-c1efb737a382 Feb 12 21:52:51.135706 env[1158]: time="2024-02-12T21:52:51.135678552Z" level=error msg="StopPodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" failed" error="failed to destroy network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:52:51.135995 kubelet[2138]: E0212 21:52:51.135906 2138 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:52:51.135995 kubelet[2138]: E0212 21:52:51.135943 2138 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587} Feb 12 21:52:51.136110 kubelet[2138]: E0212 21:52:51.136077 2138 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9131c643-285c-4cf7-a0e3-e658400fe3fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 21:52:51.136110 kubelet[2138]: E0212 21:52:51.136099 2138 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9131c643-285c-4cf7-a0e3-e658400fe3fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-sg6fd" podUID=9131c643-285c-4cf7-a0e3-e658400fe3fb Feb 12 21:52:54.939491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2162227660.mount: Deactivated successfully. Feb 12 21:52:55.079191 env[1158]: time="2024-02-12T21:52:55.079162804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:55.082880 env[1158]: time="2024-02-12T21:52:55.082862030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:55.084715 env[1158]: time="2024-02-12T21:52:55.084700122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:55.085901 env[1158]: time="2024-02-12T21:52:55.085884976Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:52:55.086342 env[1158]: time="2024-02-12T21:52:55.086324627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 21:52:55.118358 env[1158]: time="2024-02-12T21:52:55.118337570Z" level=info msg="CreateContainer within sandbox \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 21:52:55.124007 env[1158]: time="2024-02-12T21:52:55.123988840Z" level=info msg="CreateContainer within sandbox \"0f36d47519a964bbc6532a9dc5e94f4c7abb8c83d8990f453c8ad86d9a5b1184\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0\"" Feb 12 21:52:55.125273 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount596921014.mount: Deactivated successfully. Feb 12 21:52:55.125992 env[1158]: time="2024-02-12T21:52:55.125877482Z" level=info msg="StartContainer for \"d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0\"" Feb 12 21:52:55.137073 systemd[1]: Started cri-containerd-d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0.scope. Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.152974 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 12 21:52:55.155370 kernel: audit: type=1400 audit(1707774775.151:1135): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.155396 kernel: audit: type=1300 audit(1707774775.151:1135): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f41f02869f8 items=0 ppid=2587 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:55.151000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f41f02869f8 items=0 ppid=2587 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:55.159170 kernel: audit: type=1327 audit(1707774775.151:1135): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356234343539643731666536316463303864393336656134386163 Feb 12 21:52:55.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356234343539643731666536316463303864393336656134386163 Feb 12 21:52:55.162553 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.167282 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.167310 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.169667 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.172051 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.176892 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.176920 kernel: audit: type=1400 audit(1707774775.151:1136): avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.151000 audit: BPF prog-id=139 op=LOAD Feb 12 21:52:55.151000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000264a28 items=0 ppid=2587 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:55.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356234343539643731666536316463303864393336656134386163 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.158000 audit: BPF prog-id=140 op=LOAD Feb 12 21:52:55.158000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000264a78 items=0 ppid=2587 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:55.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356234343539643731666536316463303864393336656134386163 Feb 12 21:52:55.166000 audit: BPF prog-id=140 op=UNLOAD Feb 12 21:52:55.166000 audit: BPF prog-id=139 op=UNLOAD Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:55.166000 audit: BPF prog-id=141 op=LOAD Feb 12 21:52:55.166000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002889b0 items=0 ppid=2587 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:55.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356234343539643731666536316463303864393336656134386163 Feb 12 21:52:55.187575 env[1158]: time="2024-02-12T21:52:55.187554509Z" level=info msg="StartContainer for \"d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0\" returns successfully" Feb 12 21:52:55.653658 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 21:52:55.653752 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 21:52:57.049000 audit[3217]: AVC avc: denied { write } for pid=3217 comm="tee" name="fd" dev="proc" ino=35385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.049000 audit[3217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd68c0d993 a2=241 a3=1b6 items=1 ppid=3198 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.049000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 21:52:57.049000 audit: PATH item=0 name="/dev/fd/63" inode=34479 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.049000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.060000 audit[3229]: AVC avc: denied { write } for pid=3229 comm="tee" name="fd" dev="proc" ino=34502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.060000 audit[3229]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee2d86993 a2=241 a3=1b6 items=1 ppid=3199 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.060000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 21:52:57.060000 audit: PATH item=0 name="/dev/fd/63" inode=34490 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.060000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.061000 audit[3242]: AVC avc: denied { write } for pid=3242 comm="tee" name="fd" dev="proc" ino=35411 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.061000 audit[3242]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2d4ff983 a2=241 a3=1b6 items=1 ppid=3202 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.061000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 21:52:57.061000 audit: PATH item=0 name="/dev/fd/63" inode=35399 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.061000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.064000 audit[3251]: AVC avc: denied { write } for pid=3251 comm="tee" name="fd" dev="proc" ino=35420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.064000 audit[3251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0b35e993 a2=241 a3=1b6 items=1 ppid=3201 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.064000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 21:52:57.064000 audit: PATH item=0 name="/dev/fd/63" inode=34497 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.069000 audit[3254]: AVC avc: denied { write } for pid=3254 comm="tee" name="fd" dev="proc" ino=35424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.069000 audit[3254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd424c5995 a2=241 a3=1b6 items=1 ppid=3205 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.069000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 21:52:57.069000 audit: PATH item=0 name="/dev/fd/63" inode=35405 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.074000 audit[3256]: AVC avc: denied { write } for pid=3256 comm="tee" name="fd" dev="proc" ino=35428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.074000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc66f02994 a2=241 a3=1b6 items=1 ppid=3203 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.074000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 21:52:57.074000 audit: PATH item=0 name="/dev/fd/63" inode=35408 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.098000 audit[3268]: AVC avc: denied { write } for pid=3268 comm="tee" name="fd" dev="proc" ino=34522 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:52:57.098000 audit[3268]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff53d65984 a2=241 a3=1b6 items=1 ppid=3208 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.098000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 21:52:57.098000 audit: PATH item=0 name="/dev/fd/63" inode=34514 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:52:57.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:52:57.133921 systemd[1]: run-containerd-runc-k8s.io-d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0-runc.YXzKqA.mount: Deactivated successfully. Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.362000 audit: BPF prog-id=142 op=LOAD Feb 12 21:52:57.362000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffbb3fae60 a2=70 a3=7f0fbef94000 items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.362000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit: BPF prog-id=142 op=UNLOAD Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit: BPF prog-id=143 op=LOAD Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffbb3fae60 a2=70 a3=6e items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit: BPF prog-id=143 op=UNLOAD Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffbb3fae10 a2=70 a3=7fffbb3fae60 items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit: BPF prog-id=144 op=LOAD Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffbb3fadf0 a2=70 a3=7fffbb3fae60 items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit: BPF prog-id=144 op=UNLOAD Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbb3faed0 a2=70 a3=0 items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbb3faec0 a2=70 a3=0 items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffbb3faf00 a2=70 a3=0 items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.364000 audit: BPF prog-id=145 op=LOAD Feb 12 21:52:57.364000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffbb3fae20 a2=70 a3=ffffffff items=0 ppid=3200 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.364000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:52:57.366000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.366000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff06ae12c0 a2=70 a3=fff80800 items=0 ppid=3200 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.366000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 21:52:57.366000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:52:57.366000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff06ae1190 a2=70 a3=3 items=0 ppid=3200 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.366000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 21:52:57.372000 audit: BPF prog-id=145 op=UNLOAD Feb 12 21:52:57.412000 audit[3383]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3383 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:52:57.412000 audit[3383]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffca25120a0 a2=0 a3=7ffca251208c items=0 ppid=3200 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:52:57.418000 audit[3386]: NETFILTER_CFG table=mangle:100 family=2 entries=19 op=nft_register_chain pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:52:57.418000 audit[3386]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe36fb4bf0 a2=0 a3=7ffe36fb4bdc items=0 ppid=3200 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.418000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:52:57.430000 audit[3384]: NETFILTER_CFG table=nat:101 family=2 entries=16 op=nft_register_chain pid=3384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:52:57.430000 audit[3384]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff33e26680 a2=0 a3=558876cc7000 items=0 ppid=3200 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.430000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:52:57.432000 audit[3387]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:52:57.432000 audit[3387]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffda2401e70 a2=0 a3=556a13a82000 items=0 ppid=3200 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:52:57.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:52:58.297019 systemd-networkd[1066]: vxlan.calico: Link UP Feb 12 21:52:58.297025 systemd-networkd[1066]: vxlan.calico: Gained carrier Feb 12 21:53:00.241690 systemd-networkd[1066]: vxlan.calico: Gained IPv6LL Feb 12 21:53:02.016761 env[1158]: time="2024-02-12T21:53:02.016234680Z" level=info msg="StopPodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\"" Feb 12 21:53:02.017336 env[1158]: time="2024-02-12T21:53:02.017144780Z" level=info msg="StopPodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\"" Feb 12 21:53:02.143639 kubelet[2138]: I0212 21:53:02.143609 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-z7tqg" podStartSLOduration=8.301080848 podCreationTimestamp="2024-02-12 21:52:37 +0000 UTC" firstStartedPulling="2024-02-12 21:52:38.248129878 +0000 UTC m=+18.358686653" lastFinishedPulling="2024-02-12 21:52:55.08650595 +0000 UTC m=+35.197062732" observedRunningTime="2024-02-12 21:52:56.127481687 +0000 UTC m=+36.238038471" watchObservedRunningTime="2024-02-12 21:53:02.139456927 +0000 UTC m=+42.250013716" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.146 [INFO][3463] k8s.go 578: Cleaning up netns ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.146 [INFO][3463] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" iface="eth0" netns="/var/run/netns/cni-e8c169ee-fff5-51ca-45c1-bcf8bff11c63" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.146 [INFO][3463] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" iface="eth0" netns="/var/run/netns/cni-e8c169ee-fff5-51ca-45c1-bcf8bff11c63" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.146 [INFO][3463] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" iface="eth0" netns="/var/run/netns/cni-e8c169ee-fff5-51ca-45c1-bcf8bff11c63" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.146 [INFO][3463] k8s.go 585: Releasing IP address(es) ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.146 [INFO][3463] utils.go 188: Calico CNI releasing IP address ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.341 [INFO][3475] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.344 [INFO][3475] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.344 [INFO][3475] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.356 [WARNING][3475] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.356 [INFO][3475] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.357 [INFO][3475] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:02.362252 env[1158]: 2024-02-12 21:53:02.358 [INFO][3463] k8s.go 591: Teardown processing complete. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:02.369574 env[1158]: time="2024-02-12T21:53:02.362469019Z" level=info msg="TearDown network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" successfully" Feb 12 21:53:02.369574 env[1158]: time="2024-02-12T21:53:02.362493949Z" level=info msg="StopPodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" returns successfully" Feb 12 21:53:02.369574 env[1158]: time="2024-02-12T21:53:02.363040809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hlb9m,Uid:f72389d7-6cf4-48b0-afb1-b2ab2d4789f1,Namespace:calico-system,Attempt:1,}" Feb 12 21:53:02.363811 systemd[1]: run-netns-cni\x2de8c169ee\x2dfff5\x2d51ca\x2d45c1\x2dbcf8bff11c63.mount: Deactivated successfully. Feb 12 21:53:02.371693 systemd[1]: run-netns-cni\x2dd8f2d205\x2d767e\x2d1661\x2dde6b\x2dcd64e16de605.mount: Deactivated successfully. Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.139 [INFO][3462] k8s.go 578: Cleaning up netns ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.142 [INFO][3462] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" iface="eth0" netns="/var/run/netns/cni-d8f2d205-767e-1661-de6b-cd64e16de605" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.142 [INFO][3462] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" iface="eth0" netns="/var/run/netns/cni-d8f2d205-767e-1661-de6b-cd64e16de605" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.144 [INFO][3462] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" iface="eth0" netns="/var/run/netns/cni-d8f2d205-767e-1661-de6b-cd64e16de605" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.144 [INFO][3462] k8s.go 585: Releasing IP address(es) ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.144 [INFO][3462] utils.go 188: Calico CNI releasing IP address ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.341 [INFO][3474] ipam_plugin.go 415: Releasing address using handleID ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.344 [INFO][3474] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.357 [INFO][3474] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.366 [WARNING][3474] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.366 [INFO][3474] ipam_plugin.go 443: Releasing address using workloadID ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.367 [INFO][3474] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:02.382160 env[1158]: 2024-02-12 21:53:02.368 [INFO][3462] k8s.go 591: Teardown processing complete. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:02.382160 env[1158]: time="2024-02-12T21:53:02.370228844Z" level=info msg="TearDown network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" successfully" Feb 12 21:53:02.382160 env[1158]: time="2024-02-12T21:53:02.370256340Z" level=info msg="StopPodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" returns successfully" Feb 12 21:53:02.382160 env[1158]: time="2024-02-12T21:53:02.372313492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-sg6fd,Uid:9131c643-285c-4cf7-a0e3-e658400fe3fb,Namespace:kube-system,Attempt:1,}" Feb 12 21:53:02.499132 systemd-networkd[1066]: cali7754aa55900: Link UP Feb 12 21:53:02.500650 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:53:02.500693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7754aa55900: link becomes ready Feb 12 21:53:02.501559 systemd-networkd[1066]: cali7754aa55900: Gained carrier Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.436 [INFO][3486] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--hlb9m-eth0 csi-node-driver- calico-system f72389d7-6cf4-48b0-afb1-b2ab2d4789f1 662 0 2024-02-12 21:52:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-hlb9m eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7754aa55900 [] []}} ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.436 [INFO][3486] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.461 [INFO][3516] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" HandleID="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.466 [INFO][3516] ipam_plugin.go 268: Auto assigning IP ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" HandleID="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d9d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-hlb9m", "timestamp":"2024-02-12 21:53:02.461365575 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.466 [INFO][3516] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.467 [INFO][3516] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.467 [INFO][3516] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.469 [INFO][3516] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.473 [INFO][3516] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.481 [INFO][3516] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.482 [INFO][3516] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.483 [INFO][3516] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.483 [INFO][3516] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.484 [INFO][3516] ipam.go 1682: Creating new handle: k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.486 [INFO][3516] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.489 [INFO][3516] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.489 [INFO][3516] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" host="localhost" Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.489 [INFO][3516] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:02.520471 env[1158]: 2024-02-12 21:53:02.489 [INFO][3516] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" HandleID="k8s-pod-network.932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.521448 env[1158]: 2024-02-12 21:53:02.493 [INFO][3486] k8s.go 385: Populated endpoint ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hlb9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1", ResourceVersion:"662", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-hlb9m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7754aa55900", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:02.521448 env[1158]: 2024-02-12 21:53:02.493 [INFO][3486] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.521448 env[1158]: 2024-02-12 21:53:02.493 [INFO][3486] dataplane_linux.go 68: Setting the host side veth name to cali7754aa55900 ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.521448 env[1158]: 2024-02-12 21:53:02.502 [INFO][3486] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.521448 env[1158]: 2024-02-12 21:53:02.502 [INFO][3486] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hlb9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1", ResourceVersion:"662", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec", Pod:"csi-node-driver-hlb9m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7754aa55900", MAC:"92:d6:1c:f3:1d:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:02.521448 env[1158]: 2024-02-12 21:53:02.516 [INFO][3486] k8s.go 491: Wrote updated endpoint to datastore ContainerID="932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec" Namespace="calico-system" Pod="csi-node-driver-hlb9m" WorkloadEndpoint="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:02.527949 systemd-networkd[1066]: cali14775b87910: Link UP Feb 12 21:53:02.529670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14775b87910: link becomes ready Feb 12 21:53:02.529761 systemd-networkd[1066]: cali14775b87910: Gained carrier Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.444 [INFO][3492] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--sg6fd-eth0 coredns-5d78c9869d- kube-system 9131c643-285c-4cf7-a0e3-e658400fe3fb 661 0 2024-02-12 21:52:33 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-sg6fd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali14775b87910 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.444 [INFO][3492] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.474 [INFO][3522] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" HandleID="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.481 [INFO][3522] ipam_plugin.go 268: Auto assigning IP ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" HandleID="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002907e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-sg6fd", "timestamp":"2024-02-12 21:53:02.474298987 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.481 [INFO][3522] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.489 [INFO][3522] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.489 [INFO][3522] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.490 [INFO][3522] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.492 [INFO][3522] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.496 [INFO][3522] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.497 [INFO][3522] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.499 [INFO][3522] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.499 [INFO][3522] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.503 [INFO][3522] ipam.go 1682: Creating new handle: k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.513 [INFO][3522] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.524 [INFO][3522] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.524 [INFO][3522] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" host="localhost" Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.524 [INFO][3522] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:02.539570 env[1158]: 2024-02-12 21:53:02.524 [INFO][3522] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" HandleID="k8s-pod-network.9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.540021 env[1158]: 2024-02-12 21:53:02.526 [INFO][3492] k8s.go 385: Populated endpoint ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--sg6fd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9131c643-285c-4cf7-a0e3-e658400fe3fb", ResourceVersion:"661", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-sg6fd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14775b87910", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:02.540021 env[1158]: 2024-02-12 21:53:02.526 [INFO][3492] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.540021 env[1158]: 2024-02-12 21:53:02.526 [INFO][3492] dataplane_linux.go 68: Setting the host side veth name to cali14775b87910 ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.540021 env[1158]: 2024-02-12 21:53:02.529 [INFO][3492] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.540021 env[1158]: 2024-02-12 21:53:02.530 [INFO][3492] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--sg6fd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9131c643-285c-4cf7-a0e3-e658400fe3fb", ResourceVersion:"661", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f", Pod:"coredns-5d78c9869d-sg6fd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14775b87910", MAC:"4e:ac:b8:8d:ec:2a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:02.540021 env[1158]: 2024-02-12 21:53:02.538 [INFO][3492] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f" Namespace="kube-system" Pod="coredns-5d78c9869d-sg6fd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:02.546251 env[1158]: time="2024-02-12T21:53:02.546215953Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:53:02.546376 env[1158]: time="2024-02-12T21:53:02.546361897Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:53:02.546442 env[1158]: time="2024-02-12T21:53:02.546429315Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:53:02.546583 env[1158]: time="2024-02-12T21:53:02.546567950Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec pid=3567 runtime=io.containerd.runc.v2 Feb 12 21:53:02.553519 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 12 21:53:02.553583 kernel: audit: type=1325 audit(1707774782.549:1166): table=filter:103 family=2 entries=36 op=nft_register_chain pid=3588 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:02.549000 audit[3588]: NETFILTER_CFG table=filter:103 family=2 entries=36 op=nft_register_chain pid=3588 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:02.553873 env[1158]: time="2024-02-12T21:53:02.551881813Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:53:02.553873 env[1158]: time="2024-02-12T21:53:02.551912040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:53:02.553873 env[1158]: time="2024-02-12T21:53:02.551918776Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:53:02.553873 env[1158]: time="2024-02-12T21:53:02.551995310Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f pid=3582 runtime=io.containerd.runc.v2 Feb 12 21:53:02.549000 audit[3588]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcdde148e0 a2=0 a3=7ffcdde148cc items=0 ppid=3200 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.560547 kernel: audit: type=1300 audit(1707774782.549:1166): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcdde148e0 a2=0 a3=7ffcdde148cc items=0 ppid=3200 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.560582 kernel: audit: type=1327 audit(1707774782.549:1166): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:02.549000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:02.562774 systemd[1]: Started cri-containerd-9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f.scope. Feb 12 21:53:02.568611 systemd[1]: Started cri-containerd-932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec.scope. Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.582242 kernel: audit: type=1400 audit(1707774782.572:1167): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.585033 kernel: audit: type=1400 audit(1707774782.572:1168): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.585055 kernel: audit: type=1400 audit(1707774782.572:1169): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.585077 kernel: audit: type=1400 audit(1707774782.572:1170): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.582654 systemd-resolved[1104]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.588547 kernel: audit: type=1400 audit(1707774782.572:1171): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.591542 kernel: audit: type=1400 audit(1707774782.572:1172): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.594543 kernel: audit: type=1400 audit(1707774782.572:1173): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.572000 audit: BPF prog-id=146 op=LOAD Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3582 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962333438663664383161636631393833633662313436643034363436 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3582 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962333438663664383161636631393833633662313436643034363436 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.575000 audit: BPF prog-id=147 op=LOAD Feb 12 21:53:02.575000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002b63e0 items=0 ppid=3582 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962333438663664383161636631393833633662313436643034363436 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit: BPF prog-id=148 op=LOAD Feb 12 21:53:02.578000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002b6428 items=0 ppid=3582 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962333438663664383161636631393833633662313436643034363436 Feb 12 21:53:02.578000 audit: BPF prog-id=148 op=UNLOAD Feb 12 21:53:02.578000 audit: BPF prog-id=147 op=UNLOAD Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.578000 audit: BPF prog-id=149 op=LOAD Feb 12 21:53:02.578000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002b6838 items=0 ppid=3582 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962333438663664383161636631393833633662313436643034363436 Feb 12 21:53:02.603000 audit[3630]: NETFILTER_CFG table=filter:104 family=2 entries=40 op=nft_register_chain pid=3630 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:02.606065 env[1158]: time="2024-02-12T21:53:02.606046228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-sg6fd,Uid:9131c643-285c-4cf7-a0e3-e658400fe3fb,Namespace:kube-system,Attempt:1,} returns sandbox id \"9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f\"" Feb 12 21:53:02.603000 audit[3630]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd1a83ecf0 a2=0 a3=7ffd1a83ecdc items=0 ppid=3200 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.603000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:02.607905 env[1158]: time="2024-02-12T21:53:02.607892144Z" level=info msg="CreateContainer within sandbox \"9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.616000 audit: BPF prog-id=150 op=LOAD Feb 12 21:53:02.617000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.617000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3567 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326266353734653236306534326163623663313361643364383531 Feb 12 21:53:02.617000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.617000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3567 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326266353734653236306534326163623663313361643364383531 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.618000 audit: BPF prog-id=151 op=LOAD Feb 12 21:53:02.618000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002111f0 items=0 ppid=3567 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326266353734653236306534326163623663313361643364383531 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.619000 audit: BPF prog-id=152 op=LOAD Feb 12 21:53:02.619000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000211238 items=0 ppid=3567 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326266353734653236306534326163623663313361643364383531 Feb 12 21:53:02.620000 audit: BPF prog-id=152 op=UNLOAD Feb 12 21:53:02.620000 audit: BPF prog-id=151 op=UNLOAD Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.620000 audit: BPF prog-id=153 op=LOAD Feb 12 21:53:02.620000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000211648 items=0 ppid=3567 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326266353734653236306534326163623663313361643364383531 Feb 12 21:53:02.622988 env[1158]: time="2024-02-12T21:53:02.622966975Z" level=info msg="CreateContainer within sandbox \"9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d404247a52a05fcf8eb89d91af9acad7d86f2f0d32afe1c0b8b80d65272849ea\"" Feb 12 21:53:02.623236 systemd-resolved[1104]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 21:53:02.623700 env[1158]: time="2024-02-12T21:53:02.623679411Z" level=info msg="StartContainer for \"d404247a52a05fcf8eb89d91af9acad7d86f2f0d32afe1c0b8b80d65272849ea\"" Feb 12 21:53:02.636611 systemd[1]: Started cri-containerd-d404247a52a05fcf8eb89d91af9acad7d86f2f0d32afe1c0b8b80d65272849ea.scope. Feb 12 21:53:02.644694 env[1158]: time="2024-02-12T21:53:02.644609792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hlb9m,Uid:f72389d7-6cf4-48b0-afb1-b2ab2d4789f1,Namespace:calico-system,Attempt:1,} returns sandbox id \"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec\"" Feb 12 21:53:02.646139 env[1158]: time="2024-02-12T21:53:02.646125386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.647000 audit: BPF prog-id=154 op=LOAD Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3582 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432343761353261303566636638656238396439316166396163 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3582 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432343761353261303566636638656238396439316166396163 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit: BPF prog-id=155 op=LOAD Feb 12 21:53:02.648000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000305ee0 items=0 ppid=3582 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432343761353261303566636638656238396439316166396163 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.648000 audit: BPF prog-id=156 op=LOAD Feb 12 21:53:02.648000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000305f28 items=0 ppid=3582 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432343761353261303566636638656238396439316166396163 Feb 12 21:53:02.648000 audit: BPF prog-id=156 op=UNLOAD Feb 12 21:53:02.649000 audit: BPF prog-id=155 op=UNLOAD Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:02.649000 audit: BPF prog-id=157 op=LOAD Feb 12 21:53:02.649000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035c338 items=0 ppid=3582 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:02.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432343761353261303566636638656238396439316166396163 Feb 12 21:53:02.658850 env[1158]: time="2024-02-12T21:53:02.658820286Z" level=info msg="StartContainer for \"d404247a52a05fcf8eb89d91af9acad7d86f2f0d32afe1c0b8b80d65272849ea\" returns successfully" Feb 12 21:53:03.015534 env[1158]: time="2024-02-12T21:53:03.015450063Z" level=info msg="StopPodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\"" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.060 [INFO][3700] k8s.go 578: Cleaning up netns ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.060 [INFO][3700] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" iface="eth0" netns="/var/run/netns/cni-bfea5aca-cd78-fb4d-3148-6797ee9b9348" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.060 [INFO][3700] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" iface="eth0" netns="/var/run/netns/cni-bfea5aca-cd78-fb4d-3148-6797ee9b9348" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.060 [INFO][3700] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" iface="eth0" netns="/var/run/netns/cni-bfea5aca-cd78-fb4d-3148-6797ee9b9348" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.060 [INFO][3700] k8s.go 585: Releasing IP address(es) ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.060 [INFO][3700] utils.go 188: Calico CNI releasing IP address ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.072 [INFO][3706] ipam_plugin.go 415: Releasing address using handleID ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.072 [INFO][3706] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.072 [INFO][3706] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.076 [WARNING][3706] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.076 [INFO][3706] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.077 [INFO][3706] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:03.079476 env[1158]: 2024-02-12 21:53:03.078 [INFO][3700] k8s.go 591: Teardown processing complete. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:03.080274 env[1158]: time="2024-02-12T21:53:03.079609904Z" level=info msg="TearDown network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" successfully" Feb 12 21:53:03.080274 env[1158]: time="2024-02-12T21:53:03.079630924Z" level=info msg="StopPodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" returns successfully" Feb 12 21:53:03.080326 env[1158]: time="2024-02-12T21:53:03.080310673Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-84mjx,Uid:618de89e-7370-42a2-847f-c1efb737a382,Namespace:kube-system,Attempt:1,}" Feb 12 21:53:03.147499 systemd-networkd[1066]: cali2a6b767388f: Link UP Feb 12 21:53:03.149307 systemd-networkd[1066]: cali2a6b767388f: Gained carrier Feb 12 21:53:03.149620 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2a6b767388f: link becomes ready Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.104 [INFO][3712] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--84mjx-eth0 coredns-5d78c9869d- kube-system 618de89e-7370-42a2-847f-c1efb737a382 675 0 2024-02-12 21:52:33 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-84mjx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2a6b767388f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.104 [INFO][3712] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.123 [INFO][3724] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" HandleID="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.129 [INFO][3724] ipam_plugin.go 268: Auto assigning IP ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" HandleID="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-84mjx", "timestamp":"2024-02-12 21:53:03.123255981 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.129 [INFO][3724] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.129 [INFO][3724] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.129 [INFO][3724] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.130 [INFO][3724] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.132 [INFO][3724] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.133 [INFO][3724] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.134 [INFO][3724] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.136 [INFO][3724] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.136 [INFO][3724] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.137 [INFO][3724] ipam.go 1682: Creating new handle: k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480 Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.139 [INFO][3724] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.142 [INFO][3724] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.143 [INFO][3724] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" host="localhost" Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.143 [INFO][3724] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:03.177843 env[1158]: 2024-02-12 21:53:03.144 [INFO][3724] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" HandleID="k8s-pod-network.a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.187184 env[1158]: 2024-02-12 21:53:03.145 [INFO][3712] k8s.go 385: Populated endpoint ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--84mjx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"618de89e-7370-42a2-847f-c1efb737a382", ResourceVersion:"675", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-84mjx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a6b767388f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:03.187184 env[1158]: 2024-02-12 21:53:03.145 [INFO][3712] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.187184 env[1158]: 2024-02-12 21:53:03.145 [INFO][3712] dataplane_linux.go 68: Setting the host side veth name to cali2a6b767388f ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.187184 env[1158]: 2024-02-12 21:53:03.150 [INFO][3712] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.187184 env[1158]: 2024-02-12 21:53:03.151 [INFO][3712] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--84mjx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"618de89e-7370-42a2-847f-c1efb737a382", ResourceVersion:"675", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480", Pod:"coredns-5d78c9869d-84mjx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a6b767388f", MAC:"f2:d0:35:60:e0:57", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:03.187184 env[1158]: 2024-02-12 21:53:03.173 [INFO][3712] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480" Namespace="kube-system" Pod="coredns-5d78c9869d-84mjx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:03.187398 kubelet[2138]: I0212 21:53:03.180181 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-sg6fd" podStartSLOduration=30.18015635 podCreationTimestamp="2024-02-12 21:52:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 21:53:03.17983992 +0000 UTC m=+43.290396697" watchObservedRunningTime="2024-02-12 21:53:03.18015635 +0000 UTC m=+43.290713129" Feb 12 21:53:03.196604 env[1158]: time="2024-02-12T21:53:03.195505465Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:53:03.196604 env[1158]: time="2024-02-12T21:53:03.196581191Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:53:03.196733 env[1158]: time="2024-02-12T21:53:03.196589629Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:53:03.196733 env[1158]: time="2024-02-12T21:53:03.196680374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480 pid=3751 runtime=io.containerd.runc.v2 Feb 12 21:53:03.203787 systemd[1]: Started cri-containerd-a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480.scope. Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.219000 audit: BPF prog-id=158 op=LOAD Feb 12 21:53:03.219000 audit[3756]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:03.219000 audit[3756]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7fff5f211010 a2=0 a3=7fff5f210ffc items=0 ppid=3200 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3751 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383165366430303961613463313534336534636139353131336431 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3751 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383165366430303961613463313534336534636139353131336431 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit: BPF prog-id=159 op=LOAD Feb 12 21:53:03.220000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003404b0 items=0 ppid=3751 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383165366430303961613463313534336534636139353131336431 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit: BPF prog-id=160 op=LOAD Feb 12 21:53:03.220000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003404f8 items=0 ppid=3751 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383165366430303961613463313534336534636139353131336431 Feb 12 21:53:03.220000 audit: BPF prog-id=160 op=UNLOAD Feb 12 21:53:03.220000 audit: BPF prog-id=159 op=UNLOAD Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.220000 audit: BPF prog-id=161 op=LOAD Feb 12 21:53:03.220000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000340908 items=0 ppid=3751 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137383165366430303961613463313534336534636139353131336431 Feb 12 21:53:03.223007 systemd-resolved[1104]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 21:53:03.246153 env[1158]: time="2024-02-12T21:53:03.246129199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-84mjx,Uid:618de89e-7370-42a2-847f-c1efb737a382,Namespace:kube-system,Attempt:1,} returns sandbox id \"a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480\"" Feb 12 21:53:03.247981 env[1158]: time="2024-02-12T21:53:03.247965012Z" level=info msg="CreateContainer within sandbox \"a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 21:53:03.248000 audit[3781]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:03.248000 audit[3781]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc55bd3a40 a2=0 a3=7ffc55bd3a2c items=0 ppid=2312 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:03.250000 audit[3781]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:03.250000 audit[3781]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc55bd3a40 a2=0 a3=7ffc55bd3a2c items=0 ppid=2312 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:03.254338 env[1158]: time="2024-02-12T21:53:03.254315660Z" level=info msg="CreateContainer within sandbox \"a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fd15605af095bd6bc8f5f4e0b7f1bcaa46de5dfc7863522e0629cf79e4e4fef9\"" Feb 12 21:53:03.254740 env[1158]: time="2024-02-12T21:53:03.254710394Z" level=info msg="StartContainer for \"fd15605af095bd6bc8f5f4e0b7f1bcaa46de5dfc7863522e0629cf79e4e4fef9\"" Feb 12 21:53:03.270871 systemd[1]: Started cri-containerd-fd15605af095bd6bc8f5f4e0b7f1bcaa46de5dfc7863522e0629cf79e4e4fef9.scope. Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.284000 audit: BPF prog-id=162 op=LOAD Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3751 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664313536303561663039356264366263386635663465306237663162 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3751 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664313536303561663039356264366263386635663465306237663162 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit: BPF prog-id=163 op=LOAD Feb 12 21:53:03.285000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0002926d0 items=0 ppid=3751 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664313536303561663039356264366263386635663465306237663162 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit: BPF prog-id=164 op=LOAD Feb 12 21:53:03.285000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000292718 items=0 ppid=3751 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664313536303561663039356264366263386635663465306237663162 Feb 12 21:53:03.285000 audit: BPF prog-id=164 op=UNLOAD Feb 12 21:53:03.285000 audit: BPF prog-id=163 op=UNLOAD Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:03.285000 audit: BPF prog-id=165 op=LOAD Feb 12 21:53:03.285000 audit[3795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000292b28 items=0 ppid=3751 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664313536303561663039356264366263386635663465306237663162 Feb 12 21:53:03.290000 audit[3813]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:03.290000 audit[3813]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd38c91d00 a2=0 a3=7ffd38c91cec items=0 ppid=2312 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:03.295603 env[1158]: time="2024-02-12T21:53:03.295578127Z" level=info msg="StartContainer for \"fd15605af095bd6bc8f5f4e0b7f1bcaa46de5dfc7863522e0629cf79e4e4fef9\" returns successfully" Feb 12 21:53:03.290000 audit[3813]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:03.290000 audit[3813]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd38c91d00 a2=0 a3=7ffd38c91cec items=0 ppid=2312 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:03.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:03.366390 systemd[1]: run-netns-cni\x2dbfea5aca\x2dcd78\x2dfb4d\x2d3148\x2d6797ee9b9348.mount: Deactivated successfully. Feb 12 21:53:04.017165 env[1158]: time="2024-02-12T21:53:04.017105026Z" level=info msg="StopPodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\"" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.055 [INFO][3840] k8s.go 578: Cleaning up netns ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.055 [INFO][3840] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" iface="eth0" netns="/var/run/netns/cni-7ff77b79-fc47-3cd6-2273-b751d8d98ad0" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.055 [INFO][3840] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" iface="eth0" netns="/var/run/netns/cni-7ff77b79-fc47-3cd6-2273-b751d8d98ad0" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.056 [INFO][3840] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" iface="eth0" netns="/var/run/netns/cni-7ff77b79-fc47-3cd6-2273-b751d8d98ad0" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.056 [INFO][3840] k8s.go 585: Releasing IP address(es) ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.056 [INFO][3840] utils.go 188: Calico CNI releasing IP address ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.072 [INFO][3846] ipam_plugin.go 415: Releasing address using handleID ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.073 [INFO][3846] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.073 [INFO][3846] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.076 [WARNING][3846] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.076 [INFO][3846] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.077 [INFO][3846] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:04.079371 env[1158]: 2024-02-12 21:53:04.078 [INFO][3840] k8s.go 591: Teardown processing complete. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:04.081144 systemd[1]: run-netns-cni\x2d7ff77b79\x2dfc47\x2d3cd6\x2d2273\x2db751d8d98ad0.mount: Deactivated successfully. Feb 12 21:53:04.081891 env[1158]: time="2024-02-12T21:53:04.081782175Z" level=info msg="TearDown network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" successfully" Feb 12 21:53:04.081891 env[1158]: time="2024-02-12T21:53:04.081806315Z" level=info msg="StopPodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" returns successfully" Feb 12 21:53:04.082239 env[1158]: time="2024-02-12T21:53:04.082219915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b44b4558-2dbmc,Uid:877f0f06-db90-4f12-bb09-4607c2419e0f,Namespace:calico-system,Attempt:1,}" Feb 12 21:53:04.165140 kubelet[2138]: I0212 21:53:04.165116 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-84mjx" podStartSLOduration=31.165078745 podCreationTimestamp="2024-02-12 21:52:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 21:53:04.16478615 +0000 UTC m=+44.275342946" watchObservedRunningTime="2024-02-12 21:53:04.165078745 +0000 UTC m=+44.275635532" Feb 12 21:53:04.310000 audit[3854]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:04.310000 audit[3854]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe7ce4bea0 a2=0 a3=7ffe7ce4be8c items=0 ppid=2312 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:04.355000 audit[3854]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:04.355000 audit[3854]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffe7ce4bea0 a2=0 a3=7ffe7ce4be8c items=0 ppid=2312 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:04.401755 systemd-networkd[1066]: cali14775b87910: Gained IPv6LL Feb 12 21:53:04.401953 systemd-networkd[1066]: cali2a6b767388f: Gained IPv6LL Feb 12 21:53:04.515360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3791077984.mount: Deactivated successfully. Feb 12 21:53:04.529671 systemd-networkd[1066]: cali7754aa55900: Gained IPv6LL Feb 12 21:53:04.585815 systemd-networkd[1066]: calia8eae0e7ae2: Link UP Feb 12 21:53:04.588445 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:53:04.588499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8eae0e7ae2: link becomes ready Feb 12 21:53:04.588401 systemd-networkd[1066]: calia8eae0e7ae2: Gained carrier Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.543 [INFO][3858] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0 calico-kube-controllers-74b44b4558- calico-system 877f0f06-db90-4f12-bb09-4607c2419e0f 693 0 2024-02-12 21:52:38 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b44b4558 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-74b44b4558-2dbmc eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia8eae0e7ae2 [] []}} ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.543 [INFO][3858] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.561 [INFO][3872] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" HandleID="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.569 [INFO][3872] ipam_plugin.go 268: Auto assigning IP ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" HandleID="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051950), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-74b44b4558-2dbmc", "timestamp":"2024-02-12 21:53:04.561961494 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.569 [INFO][3872] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.569 [INFO][3872] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.569 [INFO][3872] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.570 [INFO][3872] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.572 [INFO][3872] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.574 [INFO][3872] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.575 [INFO][3872] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.576 [INFO][3872] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.576 [INFO][3872] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.577 [INFO][3872] ipam.go 1682: Creating new handle: k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7 Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.579 [INFO][3872] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.583 [INFO][3872] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.583 [INFO][3872] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" host="localhost" Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.583 [INFO][3872] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:04.598401 env[1158]: 2024-02-12 21:53:04.583 [INFO][3872] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" HandleID="k8s-pod-network.4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.599104 env[1158]: 2024-02-12 21:53:04.584 [INFO][3858] k8s.go 385: Populated endpoint ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0", GenerateName:"calico-kube-controllers-74b44b4558-", Namespace:"calico-system", SelfLink:"", UID:"877f0f06-db90-4f12-bb09-4607c2419e0f", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b44b4558", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-74b44b4558-2dbmc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia8eae0e7ae2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:04.599104 env[1158]: 2024-02-12 21:53:04.584 [INFO][3858] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.599104 env[1158]: 2024-02-12 21:53:04.584 [INFO][3858] dataplane_linux.go 68: Setting the host side veth name to calia8eae0e7ae2 ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.599104 env[1158]: 2024-02-12 21:53:04.588 [INFO][3858] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.599104 env[1158]: 2024-02-12 21:53:04.589 [INFO][3858] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0", GenerateName:"calico-kube-controllers-74b44b4558-", Namespace:"calico-system", SelfLink:"", UID:"877f0f06-db90-4f12-bb09-4607c2419e0f", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b44b4558", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7", Pod:"calico-kube-controllers-74b44b4558-2dbmc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia8eae0e7ae2", MAC:"16:82:b9:b3:6a:94", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:04.599104 env[1158]: 2024-02-12 21:53:04.596 [INFO][3858] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7" Namespace="calico-system" Pod="calico-kube-controllers-74b44b4558-2dbmc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:04.609949 env[1158]: time="2024-02-12T21:53:04.609895327Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:53:04.609949 env[1158]: time="2024-02-12T21:53:04.609927115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:53:04.609949 env[1158]: time="2024-02-12T21:53:04.609934480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:53:04.610248 env[1158]: time="2024-02-12T21:53:04.610205028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7 pid=3900 runtime=io.containerd.runc.v2 Feb 12 21:53:04.615000 audit[3905]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:04.615000 audit[3905]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffd9bb2aca0 a2=0 a3=7ffd9bb2ac8c items=0 ppid=3200 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.615000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:04.622660 systemd[1]: Started cri-containerd-4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7.scope. Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.633000 audit: BPF prog-id=166 op=LOAD Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3900 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396630366665646263343538663038303236343831356633393634 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3900 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396630366665646263343538663038303236343831356633393634 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.634000 audit: BPF prog-id=167 op=LOAD Feb 12 21:53:04.634000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1ce0 items=0 ppid=3900 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396630366665646263343538663038303236343831356633393634 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit: BPF prog-id=168 op=LOAD Feb 12 21:53:04.635000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d28 items=0 ppid=3900 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396630366665646263343538663038303236343831356633393634 Feb 12 21:53:04.635000 audit: BPF prog-id=168 op=UNLOAD Feb 12 21:53:04.635000 audit: BPF prog-id=167 op=UNLOAD Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.635000 audit: BPF prog-id=169 op=LOAD Feb 12 21:53:04.635000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4138 items=0 ppid=3900 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464396630366665646263343538663038303236343831356633393634 Feb 12 21:53:04.638144 systemd-resolved[1104]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 21:53:04.671259 env[1158]: time="2024-02-12T21:53:04.671233967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b44b4558-2dbmc,Uid:877f0f06-db90-4f12-bb09-4607c2419e0f,Namespace:calico-system,Attempt:1,} returns sandbox id \"4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7\"" Feb 12 21:53:04.828295 env[1158]: time="2024-02-12T21:53:04.828263992Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:04.828923 env[1158]: time="2024-02-12T21:53:04.828907931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:04.829670 env[1158]: time="2024-02-12T21:53:04.829657517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:04.830417 env[1158]: time="2024-02-12T21:53:04.830404444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:04.830779 env[1158]: time="2024-02-12T21:53:04.830765784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 21:53:04.831091 env[1158]: time="2024-02-12T21:53:04.831080422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 21:53:04.833822 env[1158]: time="2024-02-12T21:53:04.833807520Z" level=info msg="CreateContainer within sandbox \"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 21:53:04.854428 env[1158]: time="2024-02-12T21:53:04.852750220Z" level=info msg="CreateContainer within sandbox \"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7f5cc6cdbbe280aa6465fa78548f12b27e0614450a9041185109a717f413fe1e\"" Feb 12 21:53:04.854896 env[1158]: time="2024-02-12T21:53:04.854881697Z" level=info msg="StartContainer for \"7f5cc6cdbbe280aa6465fa78548f12b27e0614450a9041185109a717f413fe1e\"" Feb 12 21:53:04.864897 systemd[1]: Started cri-containerd-7f5cc6cdbbe280aa6465fa78548f12b27e0614450a9041185109a717f413fe1e.scope. Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f56700d30a8 items=0 ppid=3567 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766356363366364626265323830616136343635666137383534386631 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit: BPF prog-id=170 op=LOAD Feb 12 21:53:04.874000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003382a8 items=0 ppid=3567 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766356363366364626265323830616136343635666137383534386631 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit: BPF prog-id=171 op=LOAD Feb 12 21:53:04.874000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003382f8 items=0 ppid=3567 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766356363366364626265323830616136343635666137383534386631 Feb 12 21:53:04.874000 audit: BPF prog-id=171 op=UNLOAD Feb 12 21:53:04.874000 audit: BPF prog-id=170 op=UNLOAD Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:04.874000 audit: BPF prog-id=172 op=LOAD Feb 12 21:53:04.874000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000338388 items=0 ppid=3567 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:04.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766356363366364626265323830616136343635666137383534386631 Feb 12 21:53:04.886215 env[1158]: time="2024-02-12T21:53:04.886189338Z" level=info msg="StartContainer for \"7f5cc6cdbbe280aa6465fa78548f12b27e0614450a9041185109a717f413fe1e\" returns successfully" Feb 12 21:53:06.449671 systemd-networkd[1066]: calia8eae0e7ae2: Gained IPv6LL Feb 12 21:53:07.742471 env[1158]: time="2024-02-12T21:53:07.742434802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:07.744395 env[1158]: time="2024-02-12T21:53:07.744373685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:07.746498 env[1158]: time="2024-02-12T21:53:07.746477217Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:07.748242 env[1158]: time="2024-02-12T21:53:07.748219621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:07.752205 env[1158]: time="2024-02-12T21:53:07.752170588Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 21:53:07.753863 env[1158]: time="2024-02-12T21:53:07.753839238Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 21:53:07.767230 env[1158]: time="2024-02-12T21:53:07.767203868Z" level=info msg="CreateContainer within sandbox \"4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 21:53:07.773246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1823040540.mount: Deactivated successfully. Feb 12 21:53:07.777263 env[1158]: time="2024-02-12T21:53:07.777238424Z" level=info msg="CreateContainer within sandbox \"4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219\"" Feb 12 21:53:07.777758 env[1158]: time="2024-02-12T21:53:07.777728041Z" level=info msg="StartContainer for \"286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219\"" Feb 12 21:53:07.790870 systemd[1]: Started cri-containerd-286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219.scope. Feb 12 21:53:07.808044 kernel: kauditd_printk_skb: 405 callbacks suppressed Feb 12 21:53:07.808116 kernel: audit: type=1400 audit(1707774787.798:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.808137 kernel: audit: type=1400 audit(1707774787.798:1291): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.808152 kernel: audit: type=1400 audit(1707774787.798:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.810875 kernel: audit: type=1400 audit(1707774787.798:1293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.813407 kernel: audit: type=1400 audit(1707774787.798:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.820991 kernel: audit: type=1400 audit(1707774787.798:1295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.821022 kernel: audit: type=1400 audit(1707774787.798:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.821037 kernel: audit: type=1400 audit(1707774787.798:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.821049 kernel: audit: type=1400 audit(1707774787.798:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.823346 kernel: audit: type=1400 audit(1707774787.798:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.798000 audit: BPF prog-id=173 op=LOAD Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3900 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:07.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366135633966353933323163393933326264383536613030643438 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3900 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:07.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366135633966353933323163393933326264383536613030643438 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.806000 audit: BPF prog-id=174 op=LOAD Feb 12 21:53:07.806000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00032ab20 items=0 ppid=3900 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:07.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366135633966353933323163393933326264383536613030643438 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit: BPF prog-id=175 op=LOAD Feb 12 21:53:07.809000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00032ab68 items=0 ppid=3900 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:07.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366135633966353933323163393933326264383536613030643438 Feb 12 21:53:07.809000 audit: BPF prog-id=175 op=UNLOAD Feb 12 21:53:07.809000 audit: BPF prog-id=174 op=UNLOAD Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:07.809000 audit: BPF prog-id=176 op=LOAD Feb 12 21:53:07.809000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00032af78 items=0 ppid=3900 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:07.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366135633966353933323163393933326264383536613030643438 Feb 12 21:53:07.851320 env[1158]: time="2024-02-12T21:53:07.851292067Z" level=info msg="StartContainer for \"286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219\" returns successfully" Feb 12 21:53:08.176797 kubelet[2138]: I0212 21:53:08.176489 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b44b4558-2dbmc" podStartSLOduration=27.095138317 podCreationTimestamp="2024-02-12 21:52:38 +0000 UTC" firstStartedPulling="2024-02-12 21:53:04.671957676 +0000 UTC m=+44.782514448" lastFinishedPulling="2024-02-12 21:53:07.753279352 +0000 UTC m=+47.863836129" observedRunningTime="2024-02-12 21:53:08.171579032 +0000 UTC m=+48.282135816" watchObservedRunningTime="2024-02-12 21:53:08.176459998 +0000 UTC m=+48.287016776" Feb 12 21:53:09.391565 env[1158]: time="2024-02-12T21:53:09.391520102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:09.392406 env[1158]: time="2024-02-12T21:53:09.392388788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:09.393320 env[1158]: time="2024-02-12T21:53:09.393303669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:09.394131 env[1158]: time="2024-02-12T21:53:09.394114894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:09.394390 env[1158]: time="2024-02-12T21:53:09.394371098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 21:53:09.395732 env[1158]: time="2024-02-12T21:53:09.395712247Z" level=info msg="CreateContainer within sandbox \"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 21:53:09.402880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2459506483.mount: Deactivated successfully. Feb 12 21:53:09.418222 env[1158]: time="2024-02-12T21:53:09.418194549Z" level=info msg="CreateContainer within sandbox \"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ab9d8160e9c50acdb11514a6a6e6adc49eb4d60da9256e58ccfcd0f582e4b402\"" Feb 12 21:53:09.418670 env[1158]: time="2024-02-12T21:53:09.418658297Z" level=info msg="StartContainer for \"ab9d8160e9c50acdb11514a6a6e6adc49eb4d60da9256e58ccfcd0f582e4b402\"" Feb 12 21:53:09.436803 systemd[1]: Started cri-containerd-ab9d8160e9c50acdb11514a6a6e6adc49eb4d60da9256e58ccfcd0f582e4b402.scope. Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f39b6943688 items=0 ppid=3567 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:09.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162396438313630653963353061636462313135313461366136653661 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit: BPF prog-id=177 op=LOAD Feb 12 21:53:09.444000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000233f88 items=0 ppid=3567 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:09.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162396438313630653963353061636462313135313461366136653661 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit: BPF prog-id=178 op=LOAD Feb 12 21:53:09.444000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000233fd8 items=0 ppid=3567 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:09.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162396438313630653963353061636462313135313461366136653661 Feb 12 21:53:09.444000 audit: BPF prog-id=178 op=UNLOAD Feb 12 21:53:09.444000 audit: BPF prog-id=177 op=UNLOAD Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:09.444000 audit: BPF prog-id=179 op=LOAD Feb 12 21:53:09.444000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a0068 items=0 ppid=3567 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:09.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162396438313630653963353061636462313135313461366136653661 Feb 12 21:53:09.465300 env[1158]: time="2024-02-12T21:53:09.465271461Z" level=info msg="StartContainer for \"ab9d8160e9c50acdb11514a6a6e6adc49eb4d60da9256e58ccfcd0f582e4b402\" returns successfully" Feb 12 21:53:09.761284 systemd[1]: run-containerd-runc-k8s.io-ab9d8160e9c50acdb11514a6a6e6adc49eb4d60da9256e58ccfcd0f582e4b402-runc.LcMCSY.mount: Deactivated successfully. Feb 12 21:53:10.089842 kubelet[2138]: I0212 21:53:10.089814 2138 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 21:53:10.091628 kubelet[2138]: I0212 21:53:10.091611 2138 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 21:53:13.802630 systemd[1]: run-containerd-runc-k8s.io-d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0-runc.gGTG1a.mount: Deactivated successfully. Feb 12 21:53:13.981504 kubelet[2138]: I0212 21:53:13.981486 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-hlb9m" podStartSLOduration=29.232752768 podCreationTimestamp="2024-02-12 21:52:38 +0000 UTC" firstStartedPulling="2024-02-12 21:53:02.645812559 +0000 UTC m=+42.756369337" lastFinishedPulling="2024-02-12 21:53:09.394517396 +0000 UTC m=+49.505074173" observedRunningTime="2024-02-12 21:53:10.172297631 +0000 UTC m=+50.282854415" watchObservedRunningTime="2024-02-12 21:53:13.981457604 +0000 UTC m=+54.092014382" Feb 12 21:53:16.252000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.272185 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 12 21:53:16.272231 kernel: audit: type=1400 audit(1707774796.252:1314): avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.272249 kernel: audit: type=1300 audit(1707774796.252:1314): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002311ce0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:16.272265 kernel: audit: type=1327 audit(1707774796.252:1314): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:16.252000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002311ce0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:16.282643 kernel: audit: type=1400 audit(1707774796.263:1315): avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.282671 kernel: audit: type=1300 audit(1707774796.263:1315): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026c1aa0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:16.282687 kernel: audit: type=1327 audit(1707774796.263:1315): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:16.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:16.263000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.263000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026c1aa0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:16.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:16.920000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.920000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.929288 kernel: audit: type=1400 audit(1707774796.920:1316): avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.929346 kernel: audit: type=1400 audit(1707774796.920:1317): avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.933226 kernel: audit: type=1300 audit(1707774796.920:1316): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008264880 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.920000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008264880 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.920000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:16.936584 kernel: audit: type=1327 audit(1707774796.920:1316): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:16.920000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.920000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009530ff0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.920000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:16.920000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00900fa40 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.920000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:16.935000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.935000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0095310b0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:16.977000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.977000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0095312f0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:16.977000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:16.977000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c010792da0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:53:16.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:53:17.876000 audit[4104]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4104 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:17.876000 audit[4104]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff9885f110 a2=0 a3=7fff9885f0fc items=0 ppid=2312 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:17.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:17.876000 audit[4104]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4104 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:17.876000 audit[4104]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff9885f110 a2=0 a3=7fff9885f0fc items=0 ppid=2312 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:17.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:17.885000 audit[4106]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:17.885000 audit[4106]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff0a1abaf0 a2=0 a3=7fff0a1abadc items=0 ppid=2312 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:17.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:17.885000 audit[4106]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:17.885000 audit[4106]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff0a1abaf0 a2=0 a3=7fff0a1abadc items=0 ppid=2312 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:17.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:17.973448 kubelet[2138]: I0212 21:53:17.973429 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:53:17.976006 kubelet[2138]: I0212 21:53:17.975995 2138 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:53:17.988165 systemd[1]: Created slice kubepods-besteffort-pod27937781_1ff1_470d_8b5c_77dcb62b3975.slice. Feb 12 21:53:17.993842 systemd[1]: Created slice kubepods-besteffort-pod7e2fe75f_9070_4771_8d07_abc9f98d8207.slice. Feb 12 21:53:18.140049 kubelet[2138]: I0212 21:53:18.139957 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7e2fe75f-9070-4771-8d07-abc9f98d8207-calico-apiserver-certs\") pod \"calico-apiserver-f6c4465c9-nr7vz\" (UID: \"7e2fe75f-9070-4771-8d07-abc9f98d8207\") " pod="calico-apiserver/calico-apiserver-f6c4465c9-nr7vz" Feb 12 21:53:18.141092 kubelet[2138]: I0212 21:53:18.141075 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zqh2r\" (UniqueName: \"kubernetes.io/projected/7e2fe75f-9070-4771-8d07-abc9f98d8207-kube-api-access-zqh2r\") pod \"calico-apiserver-f6c4465c9-nr7vz\" (UID: \"7e2fe75f-9070-4771-8d07-abc9f98d8207\") " pod="calico-apiserver/calico-apiserver-f6c4465c9-nr7vz" Feb 12 21:53:18.141151 kubelet[2138]: I0212 21:53:18.141107 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hb4dl\" (UniqueName: \"kubernetes.io/projected/27937781-1ff1-470d-8b5c-77dcb62b3975-kube-api-access-hb4dl\") pod \"calico-apiserver-f6c4465c9-j2lsg\" (UID: \"27937781-1ff1-470d-8b5c-77dcb62b3975\") " pod="calico-apiserver/calico-apiserver-f6c4465c9-j2lsg" Feb 12 21:53:18.141151 kubelet[2138]: I0212 21:53:18.141129 2138 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/27937781-1ff1-470d-8b5c-77dcb62b3975-calico-apiserver-certs\") pod \"calico-apiserver-f6c4465c9-j2lsg\" (UID: \"27937781-1ff1-470d-8b5c-77dcb62b3975\") " pod="calico-apiserver/calico-apiserver-f6c4465c9-j2lsg" Feb 12 21:53:18.292121 env[1158]: time="2024-02-12T21:53:18.292087123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f6c4465c9-j2lsg,Uid:27937781-1ff1-470d-8b5c-77dcb62b3975,Namespace:calico-apiserver,Attempt:0,}" Feb 12 21:53:18.296582 env[1158]: time="2024-02-12T21:53:18.296561287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f6c4465c9-nr7vz,Uid:7e2fe75f-9070-4771-8d07-abc9f98d8207,Namespace:calico-apiserver,Attempt:0,}" Feb 12 21:53:18.564058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:53:18.564141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic86e786b201: link becomes ready Feb 12 21:53:18.562155 systemd-networkd[1066]: calic86e786b201: Link UP Feb 12 21:53:18.563862 systemd-networkd[1066]: calic86e786b201: Gained carrier Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.508 [INFO][4112] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0 calico-apiserver-f6c4465c9- calico-apiserver 27937781-1ff1-470d-8b5c-77dcb62b3975 805 0 2024-02-12 21:53:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:f6c4465c9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-f6c4465c9-j2lsg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic86e786b201 [] []}} ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.508 [INFO][4112] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.536 [INFO][4138] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" HandleID="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Workload="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.542 [INFO][4138] ipam_plugin.go 268: Auto assigning IP ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" HandleID="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Workload="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023daa0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-f6c4465c9-j2lsg", "timestamp":"2024-02-12 21:53:18.536323891 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.542 [INFO][4138] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.542 [INFO][4138] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.542 [INFO][4138] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.543 [INFO][4138] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.546 [INFO][4138] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.548 [INFO][4138] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.549 [INFO][4138] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.550 [INFO][4138] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.550 [INFO][4138] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.551 [INFO][4138] ipam.go 1682: Creating new handle: k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719 Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.553 [INFO][4138] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.557 [INFO][4138] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.557 [INFO][4138] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" host="localhost" Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.557 [INFO][4138] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:18.576813 env[1158]: 2024-02-12 21:53:18.557 [INFO][4138] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" HandleID="k8s-pod-network.ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Workload="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.580915 env[1158]: 2024-02-12 21:53:18.559 [INFO][4112] k8s.go 385: Populated endpoint ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0", GenerateName:"calico-apiserver-f6c4465c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"27937781-1ff1-470d-8b5c-77dcb62b3975", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 53, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f6c4465c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-f6c4465c9-j2lsg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic86e786b201", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:18.580915 env[1158]: 2024-02-12 21:53:18.560 [INFO][4112] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.580915 env[1158]: 2024-02-12 21:53:18.560 [INFO][4112] dataplane_linux.go 68: Setting the host side veth name to calic86e786b201 ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.580915 env[1158]: 2024-02-12 21:53:18.564 [INFO][4112] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.580915 env[1158]: 2024-02-12 21:53:18.564 [INFO][4112] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0", GenerateName:"calico-apiserver-f6c4465c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"27937781-1ff1-470d-8b5c-77dcb62b3975", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 53, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f6c4465c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719", Pod:"calico-apiserver-f6c4465c9-j2lsg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic86e786b201", MAC:"7e:05:dc:53:84:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:18.580915 env[1158]: 2024-02-12 21:53:18.574 [INFO][4112] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-j2lsg" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--j2lsg-eth0" Feb 12 21:53:18.593664 systemd-networkd[1066]: cali81ec5a713a3: Link UP Feb 12 21:53:18.595591 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81ec5a713a3: link becomes ready Feb 12 21:53:18.595592 systemd-networkd[1066]: cali81ec5a713a3: Gained carrier Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.509 [INFO][4124] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0 calico-apiserver-f6c4465c9- calico-apiserver 7e2fe75f-9070-4771-8d07-abc9f98d8207 807 0 2024-02-12 21:53:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:f6c4465c9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-f6c4465c9-nr7vz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali81ec5a713a3 [] []}} ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.509 [INFO][4124] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.530 [INFO][4139] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" HandleID="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Workload="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.543 [INFO][4139] ipam_plugin.go 268: Auto assigning IP ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" HandleID="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Workload="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002befa0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-f6c4465c9-nr7vz", "timestamp":"2024-02-12 21:53:18.530768042 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.543 [INFO][4139] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.557 [INFO][4139] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.557 [INFO][4139] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.559 [INFO][4139] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.570 [INFO][4139] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.573 [INFO][4139] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.576 [INFO][4139] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.578 [INFO][4139] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.578 [INFO][4139] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.579 [INFO][4139] ipam.go 1682: Creating new handle: k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43 Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.582 [INFO][4139] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.590 [INFO][4139] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.590 [INFO][4139] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" host="localhost" Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.590 [INFO][4139] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:18.606167 env[1158]: 2024-02-12 21:53:18.590 [INFO][4139] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" HandleID="k8s-pod-network.4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Workload="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.607771 env[1158]: 2024-02-12 21:53:18.591 [INFO][4124] k8s.go 385: Populated endpoint ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0", GenerateName:"calico-apiserver-f6c4465c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"7e2fe75f-9070-4771-8d07-abc9f98d8207", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 53, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f6c4465c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-f6c4465c9-nr7vz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81ec5a713a3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:18.607771 env[1158]: 2024-02-12 21:53:18.591 [INFO][4124] k8s.go 386: Calico CNI using IPs: [192.168.88.134/32] ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.607771 env[1158]: 2024-02-12 21:53:18.592 [INFO][4124] dataplane_linux.go 68: Setting the host side veth name to cali81ec5a713a3 ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.607771 env[1158]: 2024-02-12 21:53:18.595 [INFO][4124] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.607771 env[1158]: 2024-02-12 21:53:18.596 [INFO][4124] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0", GenerateName:"calico-apiserver-f6c4465c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"7e2fe75f-9070-4771-8d07-abc9f98d8207", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 53, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f6c4465c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43", Pod:"calico-apiserver-f6c4465c9-nr7vz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81ec5a713a3", MAC:"4e:3e:0e:a9:dc:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:18.607771 env[1158]: 2024-02-12 21:53:18.603 [INFO][4124] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43" Namespace="calico-apiserver" Pod="calico-apiserver-f6c4465c9-nr7vz" WorkloadEndpoint="localhost-k8s-calico--apiserver--f6c4465c9--nr7vz-eth0" Feb 12 21:53:18.637556 env[1158]: time="2024-02-12T21:53:18.634001193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:53:18.637556 env[1158]: time="2024-02-12T21:53:18.634025379Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:53:18.637556 env[1158]: time="2024-02-12T21:53:18.634036863Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:53:18.637556 env[1158]: time="2024-02-12T21:53:18.634098152Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719 pid=4192 runtime=io.containerd.runc.v2 Feb 12 21:53:18.640835 env[1158]: time="2024-02-12T21:53:18.640800955Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:53:18.640913 env[1158]: time="2024-02-12T21:53:18.640820682Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:53:18.640913 env[1158]: time="2024-02-12T21:53:18.640831488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:53:18.642626 env[1158]: time="2024-02-12T21:53:18.642574556Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43 pid=4205 runtime=io.containerd.runc.v2 Feb 12 21:53:18.641000 audit[4203]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=4203 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:18.641000 audit[4203]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe5edca9d0 a2=0 a3=7ffe5edca9bc items=0 ppid=3200 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:18.648191 systemd[1]: Started cri-containerd-ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719.scope. Feb 12 21:53:18.654710 systemd[1]: Started cri-containerd-4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43.scope. Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit: BPF prog-id=180 op=LOAD Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4192 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376664613731336133643236323439393733333539393936386130 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4192 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376664613731336133643236323439393733333539393936386130 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.668000 audit: BPF prog-id=181 op=LOAD Feb 12 21:53:18.668000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000294ef0 items=0 ppid=4192 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376664613731336133643236323439393733333539393936386130 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit: BPF prog-id=182 op=LOAD Feb 12 21:53:18.669000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000294f38 items=0 ppid=4192 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376664613731336133643236323439393733333539393936386130 Feb 12 21:53:18.669000 audit: BPF prog-id=182 op=UNLOAD Feb 12 21:53:18.669000 audit: BPF prog-id=181 op=UNLOAD Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.669000 audit: BPF prog-id=183 op=LOAD Feb 12 21:53:18.669000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000295348 items=0 ppid=4192 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376664613731336133643236323439393733333539393936386130 Feb 12 21:53:18.671893 systemd-resolved[1104]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 21:53:18.684000 audit[4244]: NETFILTER_CFG table=filter:118 family=2 entries=50 op=nft_register_chain pid=4244 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:53:18.684000 audit[4244]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fff710e6b70 a2=0 a3=7fff710e6b5c items=0 ppid=3200 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.684000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit: BPF prog-id=184 op=LOAD Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4205 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465303065343430353532353566326631343932303563613038643066 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4205 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465303065343430353532353566326631343932303563613038643066 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit: BPF prog-id=185 op=LOAD Feb 12 21:53:18.687000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001eba20 items=0 ppid=4205 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465303065343430353532353566326631343932303563613038643066 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit: BPF prog-id=186 op=LOAD Feb 12 21:53:18.687000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001eba68 items=0 ppid=4205 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465303065343430353532353566326631343932303563613038643066 Feb 12 21:53:18.687000 audit: BPF prog-id=186 op=UNLOAD Feb 12 21:53:18.687000 audit: BPF prog-id=185 op=UNLOAD Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:18.687000 audit: BPF prog-id=187 op=LOAD Feb 12 21:53:18.687000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001ebe78 items=0 ppid=4205 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:18.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465303065343430353532353566326631343932303563613038643066 Feb 12 21:53:18.689943 systemd-resolved[1104]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 21:53:18.715397 env[1158]: time="2024-02-12T21:53:18.715368475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f6c4465c9-j2lsg,Uid:27937781-1ff1-470d-8b5c-77dcb62b3975,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719\"" Feb 12 21:53:18.717750 env[1158]: time="2024-02-12T21:53:18.717726111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 21:53:18.721245 env[1158]: time="2024-02-12T21:53:18.721220596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f6c4465c9-nr7vz,Uid:7e2fe75f-9070-4771-8d07-abc9f98d8207,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43\"" Feb 12 21:53:19.889663 systemd-networkd[1066]: calic86e786b201: Gained IPv6LL Feb 12 21:53:19.996669 env[1158]: time="2024-02-12T21:53:19.996625729Z" level=info msg="StopPodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\"" Feb 12 21:53:20.020097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount233090751.mount: Deactivated successfully. Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.059 [WARNING][4281] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0", GenerateName:"calico-kube-controllers-74b44b4558-", Namespace:"calico-system", SelfLink:"", UID:"877f0f06-db90-4f12-bb09-4607c2419e0f", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b44b4558", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7", Pod:"calico-kube-controllers-74b44b4558-2dbmc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia8eae0e7ae2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.060 [INFO][4281] k8s.go 578: Cleaning up netns ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.060 [INFO][4281] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" iface="eth0" netns="" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.065 [INFO][4281] k8s.go 585: Releasing IP address(es) ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.065 [INFO][4281] utils.go 188: Calico CNI releasing IP address ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.081 [INFO][4289] ipam_plugin.go 415: Releasing address using handleID ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.081 [INFO][4289] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.081 [INFO][4289] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.086 [WARNING][4289] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.086 [INFO][4289] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.088 [INFO][4289] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.090753 env[1158]: 2024-02-12 21:53:20.089 [INFO][4281] k8s.go 591: Teardown processing complete. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.091597 env[1158]: time="2024-02-12T21:53:20.090773797Z" level=info msg="TearDown network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" successfully" Feb 12 21:53:20.091597 env[1158]: time="2024-02-12T21:53:20.090801269Z" level=info msg="StopPodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" returns successfully" Feb 12 21:53:20.092404 env[1158]: time="2024-02-12T21:53:20.092341252Z" level=info msg="RemovePodSandbox for \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\"" Feb 12 21:53:20.092451 env[1158]: time="2024-02-12T21:53:20.092405390Z" level=info msg="Forcibly stopping sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\"" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.156 [WARNING][4308] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0", GenerateName:"calico-kube-controllers-74b44b4558-", Namespace:"calico-system", SelfLink:"", UID:"877f0f06-db90-4f12-bb09-4607c2419e0f", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b44b4558", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4d9f06fedbc458f080264815f39645c5f30429abc78215d0dda0c9a610aee7b7", Pod:"calico-kube-controllers-74b44b4558-2dbmc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia8eae0e7ae2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.157 [INFO][4308] k8s.go 578: Cleaning up netns ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.157 [INFO][4308] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" iface="eth0" netns="" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.157 [INFO][4308] k8s.go 585: Releasing IP address(es) ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.157 [INFO][4308] utils.go 188: Calico CNI releasing IP address ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.211 [INFO][4333] ipam_plugin.go 415: Releasing address using handleID ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.211 [INFO][4333] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.211 [INFO][4333] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.217 [WARNING][4333] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.217 [INFO][4333] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" HandleID="k8s-pod-network.8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Workload="localhost-k8s-calico--kube--controllers--74b44b4558--2dbmc-eth0" Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.219 [INFO][4333] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.221696 env[1158]: 2024-02-12 21:53:20.220 [INFO][4308] k8s.go 591: Teardown processing complete. ContainerID="8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42" Feb 12 21:53:20.221696 env[1158]: time="2024-02-12T21:53:20.221354193Z" level=info msg="TearDown network for sandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" successfully" Feb 12 21:53:20.224110 env[1158]: time="2024-02-12T21:53:20.223606685Z" level=info msg="RemovePodSandbox \"8730a4a6decc336926535e89665546078ff1d3b945607074ead06181ef98dd42\" returns successfully" Feb 12 21:53:20.228199 env[1158]: time="2024-02-12T21:53:20.228165062Z" level=info msg="StopPodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\"" Feb 12 21:53:20.253395 systemd[1]: run-containerd-runc-k8s.io-286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219-runc.dOOUUh.mount: Deactivated successfully. Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.254 [WARNING][4357] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--sg6fd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9131c643-285c-4cf7-a0e3-e658400fe3fb", ResourceVersion:"681", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f", Pod:"coredns-5d78c9869d-sg6fd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14775b87910", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.255 [INFO][4357] k8s.go 578: Cleaning up netns ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.255 [INFO][4357] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" iface="eth0" netns="" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.255 [INFO][4357] k8s.go 585: Releasing IP address(es) ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.255 [INFO][4357] utils.go 188: Calico CNI releasing IP address ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.268 [INFO][4363] ipam_plugin.go 415: Releasing address using handleID ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.268 [INFO][4363] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.268 [INFO][4363] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.271 [WARNING][4363] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.271 [INFO][4363] ipam_plugin.go 443: Releasing address using workloadID ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.272 [INFO][4363] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.274594 env[1158]: 2024-02-12 21:53:20.273 [INFO][4357] k8s.go 591: Teardown processing complete. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.275005 env[1158]: time="2024-02-12T21:53:20.274986077Z" level=info msg="TearDown network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" successfully" Feb 12 21:53:20.275062 env[1158]: time="2024-02-12T21:53:20.275050668Z" level=info msg="StopPodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" returns successfully" Feb 12 21:53:20.275464 env[1158]: time="2024-02-12T21:53:20.275451971Z" level=info msg="RemovePodSandbox for \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\"" Feb 12 21:53:20.275548 env[1158]: time="2024-02-12T21:53:20.275508051Z" level=info msg="Forcibly stopping sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\"" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.300 [WARNING][4381] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--sg6fd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9131c643-285c-4cf7-a0e3-e658400fe3fb", ResourceVersion:"681", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9b348f6d81acf1983c6b146d04646009efb9dd51bb7b1065cc80be9775bda37f", Pod:"coredns-5d78c9869d-sg6fd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14775b87910", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.300 [INFO][4381] k8s.go 578: Cleaning up netns ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.300 [INFO][4381] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" iface="eth0" netns="" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.300 [INFO][4381] k8s.go 585: Releasing IP address(es) ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.300 [INFO][4381] utils.go 188: Calico CNI releasing IP address ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.313 [INFO][4387] ipam_plugin.go 415: Releasing address using handleID ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.314 [INFO][4387] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.314 [INFO][4387] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.320 [WARNING][4387] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.321 [INFO][4387] ipam_plugin.go 443: Releasing address using workloadID ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" HandleID="k8s-pod-network.26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Workload="localhost-k8s-coredns--5d78c9869d--sg6fd-eth0" Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.322 [INFO][4387] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.325113 env[1158]: 2024-02-12 21:53:20.323 [INFO][4381] k8s.go 591: Teardown processing complete. ContainerID="26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587" Feb 12 21:53:20.325481 env[1158]: time="2024-02-12T21:53:20.325140065Z" level=info msg="TearDown network for sandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" successfully" Feb 12 21:53:20.326631 env[1158]: time="2024-02-12T21:53:20.326606986Z" level=info msg="RemovePodSandbox \"26c8c97a967830a8be6bc1c825b2993e17ca1f0e36c10b706b6a716132a31587\" returns successfully" Feb 12 21:53:20.326930 env[1158]: time="2024-02-12T21:53:20.326909312Z" level=info msg="StopPodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\"" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.353 [WARNING][4405] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--84mjx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"618de89e-7370-42a2-847f-c1efb737a382", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480", Pod:"coredns-5d78c9869d-84mjx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a6b767388f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.353 [INFO][4405] k8s.go 578: Cleaning up netns ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.353 [INFO][4405] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" iface="eth0" netns="" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.353 [INFO][4405] k8s.go 585: Releasing IP address(es) ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.353 [INFO][4405] utils.go 188: Calico CNI releasing IP address ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.364 [INFO][4411] ipam_plugin.go 415: Releasing address using handleID ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.364 [INFO][4411] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.364 [INFO][4411] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.368 [WARNING][4411] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.368 [INFO][4411] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.369 [INFO][4411] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.371021 env[1158]: 2024-02-12 21:53:20.370 [INFO][4405] k8s.go 591: Teardown processing complete. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.371820 env[1158]: time="2024-02-12T21:53:20.371217910Z" level=info msg="TearDown network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" successfully" Feb 12 21:53:20.371820 env[1158]: time="2024-02-12T21:53:20.371237736Z" level=info msg="StopPodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" returns successfully" Feb 12 21:53:20.371820 env[1158]: time="2024-02-12T21:53:20.371618546Z" level=info msg="RemovePodSandbox for \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\"" Feb 12 21:53:20.371820 env[1158]: time="2024-02-12T21:53:20.371635540Z" level=info msg="Forcibly stopping sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\"" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.402 [WARNING][4429] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--84mjx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"618de89e-7370-42a2-847f-c1efb737a382", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a781e6d009aa4c1543e4ca95113d1a28dcd3471d9eb7f1c09c9bf0fa49fc3480", Pod:"coredns-5d78c9869d-84mjx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2a6b767388f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.402 [INFO][4429] k8s.go 578: Cleaning up netns ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.402 [INFO][4429] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" iface="eth0" netns="" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.402 [INFO][4429] k8s.go 585: Releasing IP address(es) ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.402 [INFO][4429] utils.go 188: Calico CNI releasing IP address ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.427 [INFO][4435] ipam_plugin.go 415: Releasing address using handleID ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.427 [INFO][4435] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.427 [INFO][4435] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.431 [WARNING][4435] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.431 [INFO][4435] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" HandleID="k8s-pod-network.90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Workload="localhost-k8s-coredns--5d78c9869d--84mjx-eth0" Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.432 [INFO][4435] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.434703 env[1158]: 2024-02-12 21:53:20.433 [INFO][4429] k8s.go 591: Teardown processing complete. ContainerID="90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e" Feb 12 21:53:20.435140 env[1158]: time="2024-02-12T21:53:20.435120658Z" level=info msg="TearDown network for sandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" successfully" Feb 12 21:53:20.436512 env[1158]: time="2024-02-12T21:53:20.436495861Z" level=info msg="RemovePodSandbox \"90915e424bea7c13d3e53eaff2ab265989c5339b7771c2304df13bdc47577c2e\" returns successfully" Feb 12 21:53:20.436978 env[1158]: time="2024-02-12T21:53:20.436965920Z" level=info msg="StopPodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\"" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.484 [WARNING][4456] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hlb9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec", Pod:"csi-node-driver-hlb9m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7754aa55900", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.484 [INFO][4456] k8s.go 578: Cleaning up netns ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.484 [INFO][4456] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" iface="eth0" netns="" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.484 [INFO][4456] k8s.go 585: Releasing IP address(es) ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.484 [INFO][4456] utils.go 188: Calico CNI releasing IP address ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.505 [INFO][4462] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.510 [INFO][4462] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.510 [INFO][4462] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.515 [WARNING][4462] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.515 [INFO][4462] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.516 [INFO][4462] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.528389 env[1158]: 2024-02-12 21:53:20.517 [INFO][4456] k8s.go 591: Teardown processing complete. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.528389 env[1158]: time="2024-02-12T21:53:20.527075878Z" level=info msg="TearDown network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" successfully" Feb 12 21:53:20.528389 env[1158]: time="2024-02-12T21:53:20.527097851Z" level=info msg="StopPodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" returns successfully" Feb 12 21:53:20.528389 env[1158]: time="2024-02-12T21:53:20.527638486Z" level=info msg="RemovePodSandbox for \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\"" Feb 12 21:53:20.528389 env[1158]: time="2024-02-12T21:53:20.527680969Z" level=info msg="Forcibly stopping sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\"" Feb 12 21:53:20.657939 systemd-networkd[1066]: cali81ec5a713a3: Gained IPv6LL Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.788 [WARNING][4481] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hlb9m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f72389d7-6cf4-48b0-afb1-b2ab2d4789f1", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 52, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"932bf574e260e42acb6c13ad3d85115e7b961f75170b6ca97dc8606d890111ec", Pod:"csi-node-driver-hlb9m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7754aa55900", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.788 [INFO][4481] k8s.go 578: Cleaning up netns ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.788 [INFO][4481] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" iface="eth0" netns="" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.788 [INFO][4481] k8s.go 585: Releasing IP address(es) ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.788 [INFO][4481] utils.go 188: Calico CNI releasing IP address ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.814 [INFO][4487] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.814 [INFO][4487] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.814 [INFO][4487] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.818 [WARNING][4487] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.818 [INFO][4487] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" HandleID="k8s-pod-network.7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Workload="localhost-k8s-csi--node--driver--hlb9m-eth0" Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.819 [INFO][4487] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:53:20.831964 env[1158]: 2024-02-12 21:53:20.830 [INFO][4481] k8s.go 591: Teardown processing complete. ContainerID="7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d" Feb 12 21:53:20.840962 env[1158]: time="2024-02-12T21:53:20.832076364Z" level=info msg="TearDown network for sandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" successfully" Feb 12 21:53:20.848051 env[1158]: time="2024-02-12T21:53:20.848032021Z" level=info msg="RemovePodSandbox \"7cce61ac29f3928efefb33a4bd913bcb80593f7011355d27a117be899364235d\" returns successfully" Feb 12 21:53:21.576096 env[1158]: time="2024-02-12T21:53:21.576064560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.578452 env[1158]: time="2024-02-12T21:53:21.578433254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.579660 env[1158]: time="2024-02-12T21:53:21.579646327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.580624 env[1158]: time="2024-02-12T21:53:21.580607651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.581247 env[1158]: time="2024-02-12T21:53:21.581229196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 21:53:21.581992 env[1158]: time="2024-02-12T21:53:21.581976162Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 21:53:21.583509 env[1158]: time="2024-02-12T21:53:21.583494569Z" level=info msg="CreateContainer within sandbox \"ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 21:53:21.592517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4242074361.mount: Deactivated successfully. Feb 12 21:53:21.594538 env[1158]: time="2024-02-12T21:53:21.594498626Z" level=info msg="CreateContainer within sandbox \"ce7fda713a3d262499733599968a0762f80e6cebda57e6972fd62defba1f9719\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"095772bc69cd497a0c76039f08373535046314b0135c8fd9b3382fca212b7e36\"" Feb 12 21:53:21.594951 env[1158]: time="2024-02-12T21:53:21.594935620Z" level=info msg="StartContainer for \"095772bc69cd497a0c76039f08373535046314b0135c8fd9b3382fca212b7e36\"" Feb 12 21:53:21.613088 systemd[1]: Started cri-containerd-095772bc69cd497a0c76039f08373535046314b0135c8fd9b3382fca212b7e36.scope. Feb 12 21:53:21.626569 kernel: kauditd_printk_skb: 146 callbacks suppressed Feb 12 21:53:21.626649 kernel: audit: type=1400 audit(1707774801.621:1364): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.632128 kernel: audit: type=1400 audit(1707774801.621:1365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.632164 kernel: audit: type=1400 audit(1707774801.621:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.637705 kernel: audit: type=1400 audit(1707774801.621:1367): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.637743 kernel: audit: type=1400 audit(1707774801.621:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.640847 kernel: audit: type=1400 audit(1707774801.621:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.643666 kernel: audit: type=1400 audit(1707774801.621:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.649586 kernel: audit: type=1400 audit(1707774801.621:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.649644 kernel: audit: type=1400 audit(1707774801.621:1372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.649659 kernel: audit: type=1400 audit(1707774801.625:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit: BPF prog-id=188 op=LOAD Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4192 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:21.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353737326263363963643439376130633736303339663038333733 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4192 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:21.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353737326263363963643439376130633736303339663038333733 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit: BPF prog-id=189 op=LOAD Feb 12 21:53:21.625000 audit[4501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000267db0 items=0 ppid=4192 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:21.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353737326263363963643439376130633736303339663038333733 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit: BPF prog-id=190 op=LOAD Feb 12 21:53:21.625000 audit[4501]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000267df8 items=0 ppid=4192 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:21.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353737326263363963643439376130633736303339663038333733 Feb 12 21:53:21.625000 audit: BPF prog-id=190 op=UNLOAD Feb 12 21:53:21.625000 audit: BPF prog-id=189 op=UNLOAD Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:21.625000 audit: BPF prog-id=191 op=LOAD Feb 12 21:53:21.625000 audit[4501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ce208 items=0 ppid=4192 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:21.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353737326263363963643439376130633736303339663038333733 Feb 12 21:53:21.668498 env[1158]: time="2024-02-12T21:53:21.668472032Z" level=info msg="StartContainer for \"095772bc69cd497a0c76039f08373535046314b0135c8fd9b3382fca212b7e36\" returns successfully" Feb 12 21:53:21.989116 env[1158]: time="2024-02-12T21:53:21.989046956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.991143 env[1158]: time="2024-02-12T21:53:21.991125548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.992581 env[1158]: time="2024-02-12T21:53:21.992565702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.995346 env[1158]: time="2024-02-12T21:53:21.995330469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:53:21.995765 env[1158]: time="2024-02-12T21:53:21.995749050Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 21:53:21.997057 env[1158]: time="2024-02-12T21:53:21.997041133Z" level=info msg="CreateContainer within sandbox \"4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 21:53:22.013984 env[1158]: time="2024-02-12T21:53:22.013943777Z" level=info msg="CreateContainer within sandbox \"4e00e44055255f2f149205ca08d0f8d69e7d1c00ce4631a0ef57bc8a6b5b6b43\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e65620389c5241105d6ffeae2bca391e7d23822dbf5e83aa0e0ecff9bf3172c5\"" Feb 12 21:53:22.014450 env[1158]: time="2024-02-12T21:53:22.014413817Z" level=info msg="StartContainer for \"e65620389c5241105d6ffeae2bca391e7d23822dbf5e83aa0e0ecff9bf3172c5\"" Feb 12 21:53:22.026514 systemd[1]: Started cri-containerd-e65620389c5241105d6ffeae2bca391e7d23822dbf5e83aa0e0ecff9bf3172c5.scope. Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.047000 audit: BPF prog-id=192 op=LOAD Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4205 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536353632303338396335323431313035643666666561653262636133 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4205 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536353632303338396335323431313035643666666561653262636133 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit: BPF prog-id=193 op=LOAD Feb 12 21:53:22.048000 audit[4537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229a10 items=0 ppid=4205 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536353632303338396335323431313035643666666561653262636133 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit: BPF prog-id=194 op=LOAD Feb 12 21:53:22.048000 audit[4537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000229a58 items=0 ppid=4205 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536353632303338396335323431313035643666666561653262636133 Feb 12 21:53:22.048000 audit: BPF prog-id=194 op=UNLOAD Feb 12 21:53:22.048000 audit: BPF prog-id=193 op=UNLOAD Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:53:22.048000 audit: BPF prog-id=195 op=LOAD Feb 12 21:53:22.048000 audit[4537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000229e68 items=0 ppid=4205 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536353632303338396335323431313035643666666561653262636133 Feb 12 21:53:22.083036 env[1158]: time="2024-02-12T21:53:22.083003760Z" level=info msg="StartContainer for \"e65620389c5241105d6ffeae2bca391e7d23822dbf5e83aa0e0ecff9bf3172c5\" returns successfully" Feb 12 21:53:22.100000 audit[4512]: AVC avc: denied { watch } for pid=4512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_21_53_18.769477219/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c549 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c25,c549 tclass=file permissive=0 Feb 12 21:53:22.100000 audit[4512]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e6bb40 a2=fc6 a3=0 items=0 ppid=4192 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c549 key=(null) Feb 12 21:53:22.100000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 21:53:22.223000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:22.223000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002af02e0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:22.223000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:22.281000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:22.281000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002a378c0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:22.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:22.304000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:22.304000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002af0380 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:22.304000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:22.335000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:53:22.335000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002af03a0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:53:22.335000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:53:22.580664 kubelet[2138]: I0212 21:53:22.580634 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-f6c4465c9-j2lsg" podStartSLOduration=2.609228811 podCreationTimestamp="2024-02-12 21:53:17 +0000 UTC" firstStartedPulling="2024-02-12 21:53:18.716345904 +0000 UTC m=+58.826902677" lastFinishedPulling="2024-02-12 21:53:21.581467477 +0000 UTC m=+61.692024252" observedRunningTime="2024-02-12 21:53:22.427063741 +0000 UTC m=+62.537620517" watchObservedRunningTime="2024-02-12 21:53:22.474350386 +0000 UTC m=+62.584907165" Feb 12 21:53:22.604231 kubelet[2138]: I0212 21:53:22.581140 2138 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-f6c4465c9-nr7vz" podStartSLOduration=2.306994877 podCreationTimestamp="2024-02-12 21:53:17 +0000 UTC" firstStartedPulling="2024-02-12 21:53:18.721835956 +0000 UTC m=+58.832392728" lastFinishedPulling="2024-02-12 21:53:21.995956141 +0000 UTC m=+62.106512917" observedRunningTime="2024-02-12 21:53:22.461049784 +0000 UTC m=+62.571606563" watchObservedRunningTime="2024-02-12 21:53:22.581115066 +0000 UTC m=+62.691671851" Feb 12 21:53:22.690000 audit[4550]: AVC avc: denied { watch } for pid=4550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_21_53_18.4009096651/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c155,c711 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c155,c711 tclass=file permissive=0 Feb 12 21:53:22.690000 audit[4550]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b65d20 a2=fc6 a3=0 items=0 ppid=4205 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c155,c711 key=(null) Feb 12 21:53:22.690000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 21:53:23.276000 audit[4569]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:23.276000 audit[4569]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc451691f0 a2=0 a3=7ffc451691dc items=0 ppid=2312 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:23.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:23.277000 audit[4569]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:23.277000 audit[4569]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc451691f0 a2=0 a3=7ffc451691dc items=0 ppid=2312 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:23.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:30.674253 systemd[1]: run-containerd-runc-k8s.io-286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219-runc.SwfANT.mount: Deactivated successfully. Feb 12 21:53:43.290001 systemd[1]: Started sshd@7-139.178.70.106:22-139.178.89.65:46280.service. Feb 12 21:53:43.307938 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 12 21:53:43.308021 kernel: audit: type=1130 audit(1707774823.298:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.106:22-139.178.89.65:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:43.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.106:22-139.178.89.65:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:43.459000 audit[4611]: USER_ACCT pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.473754 kernel: audit: type=1101 audit(1707774823.459:1409): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.473798 kernel: audit: type=1103 audit(1707774823.465:1410): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.474975 kernel: audit: type=1006 audit(1707774823.465:1411): pid=4611 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 21:53:43.479072 kernel: audit: type=1300 audit(1707774823.465:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd688be890 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:43.479100 kernel: audit: type=1327 audit(1707774823.465:1411): proctitle=737368643A20636F7265205B707269765D Feb 12 21:53:43.465000 audit[4611]: CRED_ACQ pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.465000 audit[4611]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd688be890 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:43.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:53:43.499504 sshd[4611]: Accepted publickey for core from 139.178.89.65 port 46280 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:53:43.489792 sshd[4611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:53:43.585085 systemd-logind[1141]: New session 10 of user core. Feb 12 21:53:43.585674 systemd[1]: Started session-10.scope. Feb 12 21:53:43.589000 audit[4611]: USER_START pid=4611 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.599660 kernel: audit: type=1105 audit(1707774823.589:1412): pid=4611 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.599699 kernel: audit: type=1103 audit(1707774823.594:1413): pid=4615 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.594000 audit[4615]: CRED_ACQ pid=4615 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:43.801329 systemd[1]: run-containerd-runc-k8s.io-d35b4459d71fe61dc08d936ea48ac6f99d287769c30f9394080dabe6836722c0-runc.oKy8Zz.mount: Deactivated successfully. Feb 12 21:53:44.225896 sshd[4611]: pam_unix(sshd:session): session closed for user core Feb 12 21:53:44.225000 audit[4611]: USER_END pid=4611 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:44.234547 kernel: audit: type=1106 audit(1707774824.225:1414): pid=4611 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:44.235566 kernel: audit: type=1104 audit(1707774824.225:1415): pid=4611 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:44.225000 audit[4611]: CRED_DISP pid=4611 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:44.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.106:22-139.178.89.65:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:44.227417 systemd[1]: sshd@7-139.178.70.106:22-139.178.89.65:46280.service: Deactivated successfully. Feb 12 21:53:44.230939 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 21:53:44.234680 systemd-logind[1141]: Session 10 logged out. Waiting for processes to exit. Feb 12 21:53:44.235281 systemd-logind[1141]: Removed session 10. Feb 12 21:53:48.315177 systemd[1]: run-containerd-runc-k8s.io-095772bc69cd497a0c76039f08373535046314b0135c8fd9b3382fca212b7e36-runc.82WLl8.mount: Deactivated successfully. Feb 12 21:53:49.190545 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 21:53:49.190655 kernel: audit: type=1325 audit(1707774829.187:1417): table=filter:121 family=2 entries=9 op=nft_register_rule pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.198588 kernel: audit: type=1300 audit(1707774829.187:1417): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffebf7555b0 a2=0 a3=7ffebf75559c items=0 ppid=2312 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.198637 kernel: audit: type=1327 audit(1707774829.187:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.187000 audit[4692]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.228830 kernel: audit: type=1325 audit(1707774829.197:1418): table=nat:122 family=2 entries=31 op=nft_register_chain pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.243227 kernel: audit: type=1300 audit(1707774829.197:1418): arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffebf7555b0 a2=0 a3=7ffebf75559c items=0 ppid=2312 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.249056 kernel: audit: type=1327 audit(1707774829.197:1418): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.249082 kernel: audit: type=1130 audit(1707774829.227:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.106:22-139.178.89.65:34206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:49.249099 kernel: audit: type=1325 audit(1707774829.231:1420): table=filter:123 family=2 entries=8 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.249114 kernel: audit: type=1300 audit(1707774829.231:1420): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe9f86bce0 a2=0 a3=7ffe9f86bccc items=0 ppid=2312 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.249131 kernel: audit: type=1327 audit(1707774829.231:1420): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.187000 audit[4692]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffebf7555b0 a2=0 a3=7ffebf75559c items=0 ppid=2312 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.197000 audit[4692]: NETFILTER_CFG table=nat:122 family=2 entries=31 op=nft_register_chain pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.197000 audit[4692]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffebf7555b0 a2=0 a3=7ffebf75559c items=0 ppid=2312 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.106:22-139.178.89.65:34206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:49.231000 audit[4696]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.231000 audit[4696]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe9f86bce0 a2=0 a3=7ffe9f86bccc items=0 ppid=2312 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.234000 audit[4696]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:53:49.234000 audit[4696]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffe9f86bce0 a2=0 a3=7ffe9f86bccc items=0 ppid=2312 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:53:49.229025 systemd[1]: Started sshd@8-139.178.70.106:22-139.178.89.65:34206.service. Feb 12 21:53:49.375000 audit[4695]: USER_ACCT pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:49.376764 sshd[4695]: Accepted publickey for core from 139.178.89.65 port 34206 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:53:49.375000 audit[4695]: CRED_ACQ pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:49.375000 audit[4695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06909a50 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:49.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:53:49.380552 sshd[4695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:53:49.386296 systemd-logind[1141]: New session 11 of user core. Feb 12 21:53:49.386803 systemd[1]: Started session-11.scope. Feb 12 21:53:49.388000 audit[4695]: USER_START pid=4695 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:49.389000 audit[4699]: CRED_ACQ pid=4699 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:49.628673 sshd[4695]: pam_unix(sshd:session): session closed for user core Feb 12 21:53:49.634000 audit[4695]: USER_END pid=4695 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:49.637000 audit[4695]: CRED_DISP pid=4695 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:49.640360 systemd-logind[1141]: Session 11 logged out. Waiting for processes to exit. Feb 12 21:53:49.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.106:22-139.178.89.65:34206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:49.640565 systemd[1]: sshd@8-139.178.70.106:22-139.178.89.65:34206.service: Deactivated successfully. Feb 12 21:53:49.641052 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 21:53:49.641787 systemd-logind[1141]: Removed session 11. Feb 12 21:53:50.122230 systemd[1]: run-containerd-runc-k8s.io-286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219-runc.JGQ9xN.mount: Deactivated successfully. Feb 12 21:53:54.617677 systemd[1]: Started sshd@9-139.178.70.106:22-139.178.89.65:34216.service. Feb 12 21:53:54.628790 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 21:53:54.628830 kernel: audit: type=1130 audit(1707774834.616:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.106:22-139.178.89.65:34216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:54.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.106:22-139.178.89.65:34216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:55.617000 audit[4729]: USER_ACCT pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.619894 sshd[4729]: Accepted publickey for core from 139.178.89.65 port 34216 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:53:55.618000 audit[4729]: CRED_ACQ pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.626914 kernel: audit: type=1101 audit(1707774835.617:1431): pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.626959 kernel: audit: type=1103 audit(1707774835.618:1432): pid=4729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.626977 kernel: audit: type=1006 audit(1707774835.618:1433): pid=4729 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 21:53:55.618000 audit[4729]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc6ff1f10 a2=3 a3=0 items=0 ppid=1 pid=4729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:55.632027 kernel: audit: type=1300 audit(1707774835.618:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc6ff1f10 a2=3 a3=0 items=0 ppid=1 pid=4729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:53:55.632145 kernel: audit: type=1327 audit(1707774835.618:1433): proctitle=737368643A20636F7265205B707269765D Feb 12 21:53:55.618000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:53:55.661626 sshd[4729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:53:55.694263 systemd-logind[1141]: New session 12 of user core. Feb 12 21:53:55.695160 systemd[1]: Started session-12.scope. Feb 12 21:53:55.698000 audit[4729]: USER_START pid=4729 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.705922 kernel: audit: type=1105 audit(1707774835.698:1434): pid=4729 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.705976 kernel: audit: type=1103 audit(1707774835.704:1435): pid=4731 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:55.704000 audit[4731]: CRED_ACQ pid=4731 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:56.055892 sshd[4729]: pam_unix(sshd:session): session closed for user core Feb 12 21:53:56.055000 audit[4729]: USER_END pid=4729 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:56.070131 kernel: audit: type=1106 audit(1707774836.055:1436): pid=4729 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:56.070229 kernel: audit: type=1104 audit(1707774836.055:1437): pid=4729 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:56.055000 audit[4729]: CRED_DISP pid=4729 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:53:56.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.106:22-139.178.89.65:34216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:53:56.060436 systemd[1]: sshd@9-139.178.70.106:22-139.178.89.65:34216.service: Deactivated successfully. Feb 12 21:53:56.060945 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 21:53:56.061452 systemd-logind[1141]: Session 12 logged out. Waiting for processes to exit. Feb 12 21:53:56.065001 systemd-logind[1141]: Removed session 12. Feb 12 21:54:01.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.106:22-139.178.89.65:59218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:01.058752 systemd[1]: Started sshd@10-139.178.70.106:22-139.178.89.65:59218.service. Feb 12 21:54:01.064735 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 21:54:01.072911 kernel: audit: type=1130 audit(1707774841.057:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.106:22-139.178.89.65:59218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:01.088000 audit[4746]: USER_ACCT pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.090184 sshd[4746]: Accepted publickey for core from 139.178.89.65 port 59218 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:01.093639 kernel: audit: type=1101 audit(1707774841.088:1440): pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.092000 audit[4746]: CRED_ACQ pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.094422 sshd[4746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:01.099073 kernel: audit: type=1103 audit(1707774841.092:1441): pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.099109 kernel: audit: type=1006 audit(1707774841.092:1442): pid=4746 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 21:54:01.092000 audit[4746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfdb57470 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:01.103583 kernel: audit: type=1300 audit(1707774841.092:1442): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfdb57470 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:01.103608 kernel: audit: type=1327 audit(1707774841.092:1442): proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:01.092000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:01.105685 systemd[1]: Started session-13.scope. Feb 12 21:54:01.106216 systemd-logind[1141]: New session 13 of user core. Feb 12 21:54:01.107000 audit[4746]: USER_START pid=4746 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.118490 kernel: audit: type=1105 audit(1707774841.107:1443): pid=4746 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.118538 kernel: audit: type=1103 audit(1707774841.108:1444): pid=4748 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.108000 audit[4748]: CRED_ACQ pid=4748 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.106:22-139.178.89.65:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:01.229939 sshd[4746]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:01.231407 systemd[1]: Started sshd@11-139.178.70.106:22-139.178.89.65:59222.service. Feb 12 21:54:01.239090 kernel: audit: type=1130 audit(1707774841.229:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.106:22-139.178.89.65:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:01.239124 kernel: audit: type=1106 audit(1707774841.233:1446): pid=4746 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.233000 audit[4746]: USER_END pid=4746 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.236000 audit[4746]: CRED_DISP pid=4746 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.239829 systemd-logind[1141]: Session 13 logged out. Waiting for processes to exit. Feb 12 21:54:01.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.106:22-139.178.89.65:59218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:01.240083 systemd[1]: sshd@10-139.178.70.106:22-139.178.89.65:59218.service: Deactivated successfully. Feb 12 21:54:01.240671 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 21:54:01.241160 systemd-logind[1141]: Removed session 13. Feb 12 21:54:01.364000 audit[4758]: USER_ACCT pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.364000 audit[4758]: CRED_ACQ pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.365000 audit[4758]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71fcb230 a2=3 a3=0 items=0 ppid=1 pid=4758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:01.365000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:01.366718 sshd[4758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:01.372546 sshd[4758]: Accepted publickey for core from 139.178.89.65 port 59222 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:01.369696 systemd-logind[1141]: New session 14 of user core. Feb 12 21:54:01.369854 systemd[1]: Started session-14.scope. Feb 12 21:54:01.374000 audit[4758]: USER_START pid=4758 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:01.375000 audit[4761]: CRED_ACQ pid=4761 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.259917 systemd[1]: Started sshd@12-139.178.70.106:22-139.178.89.65:59236.service. Feb 12 21:54:03.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.106:22-139.178.89.65:59236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:03.325130 sshd[4758]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:03.351000 audit[4758]: USER_END pid=4758 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.353000 audit[4758]: CRED_DISP pid=4758 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.106:22-139.178.89.65:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:03.368111 systemd[1]: sshd@11-139.178.70.106:22-139.178.89.65:59222.service: Deactivated successfully. Feb 12 21:54:03.369592 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 21:54:03.369621 systemd-logind[1141]: Session 14 logged out. Waiting for processes to exit. Feb 12 21:54:03.370304 systemd-logind[1141]: Removed session 14. Feb 12 21:54:03.442000 audit[4768]: USER_ACCT pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.444658 sshd[4768]: Accepted publickey for core from 139.178.89.65 port 59236 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:03.443000 audit[4768]: CRED_ACQ pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.443000 audit[4768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffceac2a4c0 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:03.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:03.446451 sshd[4768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:03.449813 systemd-logind[1141]: New session 15 of user core. Feb 12 21:54:03.450315 systemd[1]: Started session-15.scope. Feb 12 21:54:03.452000 audit[4768]: USER_START pid=4768 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.453000 audit[4775]: CRED_ACQ pid=4775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.577694 systemd[1]: Started sshd@13-139.178.70.106:22-141.98.11.169:41624.service. Feb 12 21:54:03.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.106:22-141.98.11.169:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:03.586200 sshd[4768]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:03.585000 audit[4768]: USER_END pid=4768 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.585000 audit[4768]: CRED_DISP pid=4768 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:03.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.106:22-139.178.89.65:59236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:03.588021 systemd[1]: sshd@12-139.178.70.106:22-139.178.89.65:59236.service: Deactivated successfully. Feb 12 21:54:03.588512 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 21:54:03.589062 systemd-logind[1141]: Session 15 logged out. Waiting for processes to exit. Feb 12 21:54:03.589577 systemd-logind[1141]: Removed session 15. Feb 12 21:54:04.533699 sshd[4784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:04.532000 audit[4784]: USER_AUTH pid=4784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:06.193645 sshd[4784]: Failed password for root from 141.98.11.169 port 41624 ssh2 Feb 12 21:54:07.003373 sshd[4784]: Connection closed by authenticating user root 141.98.11.169 port 41624 [preauth] Feb 12 21:54:07.004954 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 21:54:07.013782 kernel: audit: type=1131 audit(1707774847.002:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.106:22-141.98.11.169:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:07.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.106:22-141.98.11.169:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:07.004092 systemd[1]: sshd@13-139.178.70.106:22-141.98.11.169:41624.service: Deactivated successfully. Feb 12 21:54:07.218937 systemd[1]: Started sshd@14-139.178.70.106:22-141.98.11.169:51788.service. Feb 12 21:54:07.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.106:22-141.98.11.169:51788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:07.230480 kernel: audit: type=1130 audit(1707774847.218:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.106:22-141.98.11.169:51788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:08.456379 sshd[4791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:08.454000 audit[4791]: USER_AUTH pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:08.459549 kernel: audit: type=1100 audit(1707774848.454:1470): pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:08.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.106:22-139.178.89.65:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:08.693521 kernel: audit: type=1130 audit(1707774848.589:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.106:22-139.178.89.65:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:08.591345 systemd[1]: Started sshd@15-139.178.70.106:22-139.178.89.65:40354.service. Feb 12 21:54:08.721000 audit[4794]: USER_ACCT pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.723770 sshd[4794]: Accepted publickey for core from 139.178.89.65 port 40354 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:08.728542 kernel: audit: type=1101 audit(1707774848.721:1472): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.727000 audit[4794]: CRED_ACQ pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.736382 kernel: audit: type=1103 audit(1707774848.727:1473): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.736409 kernel: audit: type=1006 audit(1707774848.727:1474): pid=4794 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 21:54:08.736422 kernel: audit: type=1300 audit(1707774848.727:1474): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1e17cea0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:08.727000 audit[4794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1e17cea0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:08.748018 kernel: audit: type=1327 audit(1707774848.727:1474): proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:08.756799 kernel: audit: type=1105 audit(1707774848.742:1475): pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.727000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:08.742000 audit[4794]: USER_START pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.743000 audit[4796]: CRED_ACQ pid=4796 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:08.729034 sshd[4794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:08.740929 systemd[1]: Started session-16.scope. Feb 12 21:54:08.741354 systemd-logind[1141]: New session 16 of user core. Feb 12 21:54:09.032687 sshd[4794]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:09.032000 audit[4794]: USER_END pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.034000 audit[4794]: CRED_DISP pid=4794 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.106:22-139.178.89.65:40356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:09.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.106:22-139.178.89.65:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:09.037560 systemd[1]: Started sshd@16-139.178.70.106:22-139.178.89.65:40356.service. Feb 12 21:54:09.037979 systemd[1]: sshd@15-139.178.70.106:22-139.178.89.65:40354.service: Deactivated successfully. Feb 12 21:54:09.038501 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 21:54:09.040223 systemd-logind[1141]: Session 16 logged out. Waiting for processes to exit. Feb 12 21:54:09.041652 systemd-logind[1141]: Removed session 16. Feb 12 21:54:09.070000 audit[4805]: USER_ACCT pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.072452 sshd[4805]: Accepted publickey for core from 139.178.89.65 port 40356 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:09.071000 audit[4805]: CRED_ACQ pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.071000 audit[4805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad758180 a2=3 a3=0 items=0 ppid=1 pid=4805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:09.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:09.073049 sshd[4805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:09.076208 systemd[1]: Started session-17.scope. Feb 12 21:54:09.077272 systemd-logind[1141]: New session 17 of user core. Feb 12 21:54:09.078000 audit[4805]: USER_START pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.079000 audit[4808]: CRED_ACQ pid=4808 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.488572 sshd[4805]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:09.490762 systemd[1]: Started sshd@17-139.178.70.106:22-139.178.89.65:40360.service. Feb 12 21:54:09.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.106:22-139.178.89.65:40360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:09.491000 audit[4805]: USER_END pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.491000 audit[4805]: CRED_DISP pid=4805 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.494723 systemd[1]: sshd@16-139.178.70.106:22-139.178.89.65:40356.service: Deactivated successfully. Feb 12 21:54:09.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.106:22-139.178.89.65:40356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:09.494917 systemd-logind[1141]: Session 17 logged out. Waiting for processes to exit. Feb 12 21:54:09.495567 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 21:54:09.496067 systemd-logind[1141]: Removed session 17. Feb 12 21:54:09.570000 audit[4816]: USER_ACCT pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.572434 sshd[4816]: Accepted publickey for core from 139.178.89.65 port 40360 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:09.571000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.571000 audit[4816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1304ad0 a2=3 a3=0 items=0 ppid=1 pid=4816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:09.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:09.573257 sshd[4816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:09.576678 systemd[1]: Started session-18.scope. Feb 12 21:54:09.577032 systemd-logind[1141]: New session 18 of user core. Feb 12 21:54:09.578000 audit[4816]: USER_START pid=4816 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:09.579000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.672324 systemd[1]: Started sshd@18-139.178.70.106:22-139.178.89.65:40376.service. Feb 12 21:54:10.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.106:22-139.178.89.65:40376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:10.677675 sshd[4791]: Failed password for root from 141.98.11.169 port 51788 ssh2 Feb 12 21:54:10.688714 sshd[4816]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:10.698000 audit[4816]: USER_END pid=4816 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.699000 audit[4816]: CRED_DISP pid=4816 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.106:22-139.178.89.65:40360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:10.713758 systemd[1]: sshd@17-139.178.70.106:22-139.178.89.65:40360.service: Deactivated successfully. Feb 12 21:54:10.714295 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 21:54:10.715208 systemd-logind[1141]: Session 18 logged out. Waiting for processes to exit. Feb 12 21:54:10.716089 systemd-logind[1141]: Removed session 18. Feb 12 21:54:10.739000 audit[4834]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:10.739000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd9a615470 a2=0 a3=7ffd9a61545c items=0 ppid=2312 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:10.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:10.740000 audit[4834]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:10.740000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffd9a615470 a2=0 a3=31030 items=0 ppid=2312 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:10.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:10.746102 sshd[4831]: Accepted publickey for core from 139.178.89.65 port 40376 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:10.744000 audit[4831]: USER_ACCT pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.745000 audit[4831]: CRED_ACQ pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.745000 audit[4831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2c92e0a0 a2=3 a3=0 items=0 ppid=1 pid=4831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:10.745000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:10.747692 sshd[4831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:10.751982 systemd[1]: Started session-19.scope. Feb 12 21:54:10.752796 systemd-logind[1141]: New session 19 of user core. Feb 12 21:54:10.754000 audit[4831]: USER_START pid=4831 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.755000 audit[4836]: CRED_ACQ pid=4836 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:10.766000 audit[4837]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=4837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:10.766000 audit[4837]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffda138e120 a2=0 a3=7ffda138e10c items=0 ppid=2312 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:10.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:10.767000 audit[4837]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:10.767000 audit[4837]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffda138e120 a2=0 a3=31030 items=0 ppid=2312 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:10.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:10.941312 sshd[4791]: Connection closed by authenticating user root 141.98.11.169 port 51788 [preauth] Feb 12 21:54:10.942213 systemd[1]: sshd@14-139.178.70.106:22-141.98.11.169:51788.service: Deactivated successfully. Feb 12 21:54:10.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.106:22-141.98.11.169:51788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:11.131839 systemd[1]: Started sshd@19-139.178.70.106:22-141.98.11.169:39816.service. Feb 12 21:54:11.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.106:22-141.98.11.169:39816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:11.424832 systemd[1]: Started sshd@20-139.178.70.106:22-139.178.89.65:40382.service. Feb 12 21:54:11.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.106:22-139.178.89.65:40382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:11.428960 sshd[4831]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:11.434000 audit[4831]: USER_END pid=4831 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.435000 audit[4831]: CRED_DISP pid=4831 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.439930 systemd[1]: sshd@18-139.178.70.106:22-139.178.89.65:40376.service: Deactivated successfully. Feb 12 21:54:11.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.106:22-139.178.89.65:40376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:11.440514 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 21:54:11.441300 systemd-logind[1141]: Session 19 logged out. Waiting for processes to exit. Feb 12 21:54:11.441924 systemd-logind[1141]: Removed session 19. Feb 12 21:54:11.463000 audit[4849]: USER_ACCT pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.465433 sshd[4849]: Accepted publickey for core from 139.178.89.65 port 40382 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:11.464000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.464000 audit[4849]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe965bd600 a2=3 a3=0 items=0 ppid=1 pid=4849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:11.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:11.466796 sshd[4849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:11.469984 systemd[1]: Started session-20.scope. Feb 12 21:54:11.470254 systemd-logind[1141]: New session 20 of user core. Feb 12 21:54:11.471000 audit[4849]: USER_START pid=4849 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.472000 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.572900 sshd[4849]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:11.572000 audit[4849]: USER_END pid=4849 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.572000 audit[4849]: CRED_DISP pid=4849 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:11.574616 systemd-logind[1141]: Session 20 logged out. Waiting for processes to exit. Feb 12 21:54:11.574802 systemd[1]: sshd@20-139.178.70.106:22-139.178.89.65:40382.service: Deactivated successfully. Feb 12 21:54:11.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.106:22-139.178.89.65:40382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:11.575262 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 21:54:11.576020 systemd-logind[1141]: Removed session 20. Feb 12 21:54:12.215937 sshd[4846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:12.249095 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 21:54:12.257311 kernel: audit: type=1100 audit(1707774852.214:1522): pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:12.214000 audit[4846]: USER_AUTH pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:13.975907 sshd[4846]: Failed password for root from 141.98.11.169 port 39816 ssh2 Feb 12 21:54:14.696638 sshd[4846]: Connection closed by authenticating user root 141.98.11.169 port 39816 [preauth] Feb 12 21:54:14.697493 systemd[1]: sshd@19-139.178.70.106:22-141.98.11.169:39816.service: Deactivated successfully. Feb 12 21:54:14.701643 kernel: audit: type=1131 audit(1707774854.696:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.106:22-141.98.11.169:39816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:14.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.106:22-141.98.11.169:39816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:14.884293 systemd[1]: Started sshd@21-139.178.70.106:22-141.98.11.169:56944.service. Feb 12 21:54:14.890225 kernel: audit: type=1130 audit(1707774854.882:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.106:22-141.98.11.169:56944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:14.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.106:22-141.98.11.169:56944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:15.787000 audit[4890]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:15.787000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff2d617c60 a2=0 a3=7fff2d617c4c items=0 ppid=2312 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:15.796360 kernel: audit: type=1325 audit(1707774855.787:1525): table=filter:129 family=2 entries=20 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:15.796409 kernel: audit: type=1300 audit(1707774855.787:1525): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff2d617c60 a2=0 a3=7fff2d617c4c items=0 ppid=2312 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:15.796479 kernel: audit: type=1327 audit(1707774855.787:1525): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:15.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:15.790000 audit[4890]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:15.790000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fff2d617c60 a2=0 a3=7fff2d617c4c items=0 ppid=2312 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:15.805174 kernel: audit: type=1325 audit(1707774855.790:1526): table=nat:130 family=2 entries=106 op=nft_register_chain pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:54:15.805222 kernel: audit: type=1300 audit(1707774855.790:1526): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fff2d617c60 a2=0 a3=7fff2d617c4c items=0 ppid=2312 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:15.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:15.807036 kernel: audit: type=1327 audit(1707774855.790:1526): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:54:15.938355 sshd[4887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:15.937000 audit[4887]: USER_AUTH pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:15.943588 kernel: audit: type=1100 audit(1707774855.937:1527): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:16.291000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:16.291000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:16.291000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000872090 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:54:16.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:54:16.291000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000da0ca0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:54:16.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:54:16.577200 systemd[1]: Started sshd@22-139.178.70.106:22-139.178.89.65:40386.service. Feb 12 21:54:16.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.106:22-139.178.89.65:40386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:16.609000 audit[4893]: USER_ACCT pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:16.610863 sshd[4893]: Accepted publickey for core from 139.178.89.65 port 40386 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:16.609000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:16.610000 audit[4893]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbdee92c0 a2=3 a3=0 items=0 ppid=1 pid=4893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:16.610000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:16.631133 sshd[4893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:16.637566 systemd-logind[1141]: New session 21 of user core. Feb 12 21:54:16.638286 systemd[1]: Started session-21.scope. Feb 12 21:54:16.645000 audit[4893]: USER_START pid=4893 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:16.649000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:16.777255 sshd[4893]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:16.776000 audit[4893]: USER_END pid=4893 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:16.776000 audit[4893]: CRED_DISP pid=4893 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:16.779257 systemd-logind[1141]: Session 21 logged out. Waiting for processes to exit. Feb 12 21:54:16.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.106:22-139.178.89.65:40386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:16.780155 systemd[1]: sshd@22-139.178.70.106:22-139.178.89.65:40386.service: Deactivated successfully. Feb 12 21:54:16.780668 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 21:54:16.781766 systemd-logind[1141]: Removed session 21. Feb 12 21:54:17.015000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:17.015000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c009172810 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:54:17.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:54:17.036000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:17.036000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0091728a0 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:54:17.036000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:54:17.036000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:17.036000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c009172900 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:54:17.036000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:54:17.040000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:17.040000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c009172930 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:54:17.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:54:17.040000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:17.040000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c005c3f880 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:54:17.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:54:17.069000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:17.069000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005c3fa40 a2=fc6 a3=0 items=0 ppid=1825 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c87,c1006 key=(null) Feb 12 21:54:17.069000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313036002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 21:54:18.111892 sshd[4887]: Failed password for root from 141.98.11.169 port 56944 ssh2 Feb 12 21:54:18.313493 systemd[1]: run-containerd-runc-k8s.io-095772bc69cd497a0c76039f08373535046314b0135c8fd9b3382fca212b7e36-runc.tq9tBP.mount: Deactivated successfully. Feb 12 21:54:18.412692 sshd[4887]: Connection closed by authenticating user root 141.98.11.169 port 56944 [preauth] Feb 12 21:54:18.416961 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 12 21:54:18.417379 kernel: audit: type=1131 audit(1707774858.414:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.106:22-141.98.11.169:56944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:18.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.106:22-141.98.11.169:56944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:18.415913 systemd[1]: sshd@21-139.178.70.106:22-141.98.11.169:56944.service: Deactivated successfully. Feb 12 21:54:18.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.106:22-141.98.11.169:45460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:18.598661 systemd[1]: Started sshd@23-139.178.70.106:22-141.98.11.169:45460.service. Feb 12 21:54:18.603618 kernel: audit: type=1130 audit(1707774858.597:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.106:22-141.98.11.169:45460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:19.607136 sshd[4950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:19.605000 audit[4950]: ANOM_LOGIN_FAILURES pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:19.607211 sshd[4950]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 21:54:19.605000 audit[4950]: USER_AUTH pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:19.612467 kernel: audit: type=2100 audit(1707774859.605:1547): pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:19.612865 kernel: audit: type=1100 audit(1707774859.605:1548): pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:20.145014 systemd[1]: run-containerd-runc-k8s.io-286a5c9f59321c9932bd856a00d489581fc50ebdd93cd9fed9561e8cc6039219-runc.U0S3q2.mount: Deactivated successfully. Feb 12 21:54:21.662591 sshd[4950]: Failed password for root from 141.98.11.169 port 45460 ssh2 Feb 12 21:54:21.780976 systemd[1]: Started sshd@24-139.178.70.106:22-139.178.89.65:38462.service. Feb 12 21:54:21.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.106:22-139.178.89.65:38462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:21.785539 kernel: audit: type=1130 audit(1707774861.779:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.106:22-139.178.89.65:38462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:21.847000 audit[4974]: USER_ACCT pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:21.848995 sshd[4974]: Accepted publickey for core from 139.178.89.65 port 38462 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:21.850000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:21.855574 kernel: audit: type=1101 audit(1707774861.847:1550): pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:21.855600 kernel: audit: type=1103 audit(1707774861.850:1551): pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:21.855618 kernel: audit: type=1006 audit(1707774861.853:1552): pid=4974 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 21:54:21.857403 kernel: audit: type=1300 audit(1707774861.853:1552): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe378a0110 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:21.853000 audit[4974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe378a0110 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:21.853000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:21.861907 kernel: audit: type=1327 audit(1707774861.853:1552): proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:21.862024 sshd[4974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:21.868269 systemd-logind[1141]: New session 22 of user core. Feb 12 21:54:21.869087 systemd[1]: Started session-22.scope. Feb 12 21:54:21.870000 audit[4974]: USER_START pid=4974 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:21.871000 audit[4976]: CRED_ACQ pid=4976 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:22.040600 sshd[4974]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:22.039000 audit[4974]: USER_END pid=4974 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:22.039000 audit[4974]: CRED_DISP pid=4974 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:22.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.106:22-139.178.89.65:38462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:22.042145 systemd[1]: sshd@24-139.178.70.106:22-139.178.89.65:38462.service: Deactivated successfully. Feb 12 21:54:22.042669 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 21:54:22.043005 systemd-logind[1141]: Session 22 logged out. Waiting for processes to exit. Feb 12 21:54:22.043478 systemd-logind[1141]: Removed session 22. Feb 12 21:54:22.073793 sshd[4950]: Connection closed by authenticating user root 141.98.11.169 port 45460 [preauth] Feb 12 21:54:22.074378 systemd[1]: sshd@23-139.178.70.106:22-141.98.11.169:45460.service: Deactivated successfully. Feb 12 21:54:22.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.106:22-141.98.11.169:45460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:22.170000 audit[4512]: AVC avc: denied { watch } for pid=4512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_21_53_18.769477219/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c549 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c25,c549 tclass=file permissive=0 Feb 12 21:54:22.170000 audit[4512]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019503a0 a2=fc6 a3=0 items=0 ppid=4192 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c549 key=(null) Feb 12 21:54:22.170000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 21:54:22.274565 systemd[1]: Started sshd@25-139.178.70.106:22-141.98.11.169:57064.service. Feb 12 21:54:22.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.106:22-141.98.11.169:57064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:22.362000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:22.362000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fe8e00 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:54:22.362000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:54:22.362000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:22.362000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fe8e40 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:54:22.362000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:54:22.418000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:22.418000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e24ec0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:54:22.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:54:22.443000 audit[1992]: AVC avc: denied { watch } for pid=1992 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 21:54:22.443000 audit[1992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fe92c0 a2=fc6 a3=0 items=0 ppid=1854 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c822 key=(null) Feb 12 21:54:22.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 21:54:22.691000 audit[4550]: AVC avc: denied { watch } for pid=4550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_21_53_18.4009096651/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c155,c711 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c155,c711 tclass=file permissive=0 Feb 12 21:54:22.691000 audit[4550]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005df500 a2=fc6 a3=0 items=0 ppid=4205 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c155,c711 key=(null) Feb 12 21:54:22.691000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 21:54:23.406978 update_engine[1143]: I0212 21:54:23.399258 1143 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 12 21:54:23.406978 update_engine[1143]: I0212 21:54:23.406888 1143 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 12 21:54:23.457290 update_engine[1143]: I0212 21:54:23.457129 1143 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 12 21:54:23.462613 update_engine[1143]: I0212 21:54:23.462590 1143 omaha_request_params.cc:62] Current group set to lts Feb 12 21:54:23.472451 sshd[4986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:23.478088 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 21:54:23.478132 kernel: audit: type=1100 audit(1707774863.471:1566): pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:23.471000 audit[4986]: USER_AUTH pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed' Feb 12 21:54:23.493366 update_engine[1143]: I0212 21:54:23.493333 1143 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 12 21:54:23.493366 update_engine[1143]: I0212 21:54:23.493351 1143 update_attempter.cc:643] Scheduling an action processor start. Feb 12 21:54:23.493366 update_engine[1143]: I0212 21:54:23.493366 1143 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 21:54:23.496829 update_engine[1143]: I0212 21:54:23.496377 1143 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 12 21:54:23.496829 update_engine[1143]: I0212 21:54:23.496449 1143 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 21:54:23.496829 update_engine[1143]: I0212 21:54:23.496454 1143 omaha_request_action.cc:271] Request: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: Feb 12 21:54:23.496829 update_engine[1143]: I0212 21:54:23.496457 1143 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 21:54:23.508582 update_engine[1143]: I0212 21:54:23.508127 1143 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 21:54:23.508582 update_engine[1143]: E0212 21:54:23.508205 1143 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 21:54:23.508582 update_engine[1143]: I0212 21:54:23.508266 1143 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 12 21:54:23.528057 locksmithd[1198]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 12 21:54:25.407595 sshd[4986]: Failed password for root from 141.98.11.169 port 57064 ssh2 Feb 12 21:54:25.950333 sshd[4986]: Connection closed by authenticating user root 141.98.11.169 port 57064 [preauth] Feb 12 21:54:25.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.106:22-141.98.11.169:57064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:25.955598 kernel: audit: type=1131 audit(1707774865.950:1567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.106:22-141.98.11.169:57064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:25.951407 systemd[1]: sshd@25-139.178.70.106:22-141.98.11.169:57064.service: Deactivated successfully. Feb 12 21:54:26.156417 systemd[1]: Started sshd@26-139.178.70.106:22-141.98.11.169:46280.service. Feb 12 21:54:26.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.106:22-141.98.11.169:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:26.160547 kernel: audit: type=1130 audit(1707774866.155:1568): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.106:22-141.98.11.169:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:27.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.106:22-139.178.89.65:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:27.043945 systemd[1]: Started sshd@27-139.178.70.106:22-139.178.89.65:38468.service. Feb 12 21:54:27.047536 kernel: audit: type=1130 audit(1707774867.042:1569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.106:22-139.178.89.65:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:27.071000 audit[4994]: USER_ACCT pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.072806 sshd[4994]: Accepted publickey for core from 139.178.89.65 port 38468 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 21:54:27.076573 kernel: audit: type=1101 audit(1707774867.071:1570): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.075000 audit[4994]: CRED_ACQ pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.080121 sshd[4994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:54:27.081922 kernel: audit: type=1103 audit(1707774867.075:1571): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.081954 kernel: audit: type=1006 audit(1707774867.075:1572): pid=4994 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 21:54:27.075000 audit[4994]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1f0a0930 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:27.085418 kernel: audit: type=1300 audit(1707774867.075:1572): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1f0a0930 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:54:27.085447 kernel: audit: type=1327 audit(1707774867.075:1572): proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:27.075000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:54:27.089451 systemd[1]: Started session-23.scope. Feb 12 21:54:27.090017 systemd-logind[1141]: New session 23 of user core. Feb 12 21:54:27.091000 audit[4994]: USER_START pid=4994 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.092000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.096553 kernel: audit: type=1105 audit(1707774867.091:1573): pid=4994 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.272682 sshd[4994]: pam_unix(sshd:session): session closed for user core Feb 12 21:54:27.296000 audit[4994]: USER_END pid=4994 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.296000 audit[4994]: CRED_DISP pid=4994 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:54:27.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.106:22-139.178.89.65:38468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:54:27.298960 systemd[1]: sshd@27-139.178.70.106:22-139.178.89.65:38468.service: Deactivated successfully. Feb 12 21:54:27.299457 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 21:54:27.299974 systemd-logind[1141]: Session 23 logged out. Waiting for processes to exit. Feb 12 21:54:27.300401 systemd-logind[1141]: Removed session 23. Feb 12 21:54:27.782888 sshd[4991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.169 user=root Feb 12 21:54:27.781000 audit[4991]: USER_AUTH pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.169 addr=141.98.11.169 terminal=ssh res=failed'