Feb 12 22:04:20.650282 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:04:20.650297 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:04:20.650304 kernel: Disabled fast string operations Feb 12 22:04:20.650308 kernel: BIOS-provided physical RAM map: Feb 12 22:04:20.650312 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Feb 12 22:04:20.650316 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Feb 12 22:04:20.650321 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Feb 12 22:04:20.650326 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Feb 12 22:04:20.650330 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Feb 12 22:04:20.650334 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Feb 12 22:04:20.650338 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Feb 12 22:04:20.650342 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Feb 12 22:04:20.650346 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Feb 12 22:04:20.650350 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 12 22:04:20.650356 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Feb 12 22:04:20.650361 kernel: NX (Execute Disable) protection: active Feb 12 22:04:20.650365 kernel: SMBIOS 2.7 present. Feb 12 22:04:20.650370 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Feb 12 22:04:20.650375 kernel: vmware: hypercall mode: 0x00 Feb 12 22:04:20.650379 kernel: Hypervisor detected: VMware Feb 12 22:04:20.650384 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Feb 12 22:04:20.650389 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Feb 12 22:04:20.650393 kernel: vmware: using clock offset of 2824811846 ns Feb 12 22:04:20.650398 kernel: tsc: Detected 3408.000 MHz processor Feb 12 22:04:20.650403 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:04:20.650407 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:04:20.650412 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Feb 12 22:04:20.650417 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:04:20.650421 kernel: total RAM covered: 3072M Feb 12 22:04:20.650427 kernel: Found optimal setting for mtrr clean up Feb 12 22:04:20.650432 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Feb 12 22:04:20.650437 kernel: Using GB pages for direct mapping Feb 12 22:04:20.650441 kernel: ACPI: Early table checksum verification disabled Feb 12 22:04:20.650448 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Feb 12 22:04:20.650453 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Feb 12 22:04:20.650458 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Feb 12 22:04:20.650462 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Feb 12 22:04:20.650467 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 12 22:04:20.650471 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 12 22:04:20.650477 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Feb 12 22:04:20.650484 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Feb 12 22:04:20.650489 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Feb 12 22:04:20.650494 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Feb 12 22:04:20.650499 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Feb 12 22:04:20.650505 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Feb 12 22:04:20.650510 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Feb 12 22:04:20.650515 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Feb 12 22:04:20.650520 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 12 22:04:20.650525 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 12 22:04:20.650530 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Feb 12 22:04:20.650535 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Feb 12 22:04:20.650540 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Feb 12 22:04:20.650545 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Feb 12 22:04:20.650550 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Feb 12 22:04:20.650555 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Feb 12 22:04:20.650560 kernel: system APIC only can use physical flat Feb 12 22:04:20.650565 kernel: Setting APIC routing to physical flat. Feb 12 22:04:20.650570 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 22:04:20.650575 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Feb 12 22:04:20.650580 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Feb 12 22:04:20.650585 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Feb 12 22:04:20.650589 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Feb 12 22:04:20.650595 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Feb 12 22:04:20.650600 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Feb 12 22:04:20.650605 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Feb 12 22:04:20.650610 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Feb 12 22:04:20.650615 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Feb 12 22:04:20.650620 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Feb 12 22:04:20.650624 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Feb 12 22:04:20.650629 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Feb 12 22:04:20.650634 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Feb 12 22:04:20.650639 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Feb 12 22:04:20.650645 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Feb 12 22:04:20.650650 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Feb 12 22:04:20.650655 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Feb 12 22:04:20.650659 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Feb 12 22:04:20.650664 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Feb 12 22:04:20.650669 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Feb 12 22:04:20.650674 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Feb 12 22:04:20.650679 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Feb 12 22:04:20.650684 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Feb 12 22:04:20.650689 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Feb 12 22:04:20.650694 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Feb 12 22:04:20.650699 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Feb 12 22:04:20.650704 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Feb 12 22:04:20.650709 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Feb 12 22:04:20.650714 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Feb 12 22:04:20.650719 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Feb 12 22:04:20.650724 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Feb 12 22:04:20.650728 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Feb 12 22:04:20.650733 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Feb 12 22:04:20.650738 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Feb 12 22:04:20.650744 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Feb 12 22:04:20.650749 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Feb 12 22:04:20.650754 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Feb 12 22:04:20.650758 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Feb 12 22:04:20.650763 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Feb 12 22:04:20.650768 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Feb 12 22:04:20.650773 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Feb 12 22:04:20.650778 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Feb 12 22:04:20.650783 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Feb 12 22:04:20.650787 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Feb 12 22:04:20.650793 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Feb 12 22:04:20.650798 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Feb 12 22:04:20.650803 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Feb 12 22:04:20.650808 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Feb 12 22:04:20.650813 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Feb 12 22:04:20.650817 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Feb 12 22:04:20.650822 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Feb 12 22:04:20.650827 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Feb 12 22:04:20.650832 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Feb 12 22:04:20.650837 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Feb 12 22:04:20.650842 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Feb 12 22:04:20.650848 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Feb 12 22:04:20.650852 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Feb 12 22:04:20.650857 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Feb 12 22:04:20.650862 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Feb 12 22:04:20.650878 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Feb 12 22:04:20.653894 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Feb 12 22:04:20.653905 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Feb 12 22:04:20.653910 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Feb 12 22:04:20.653916 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Feb 12 22:04:20.653923 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Feb 12 22:04:20.653928 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Feb 12 22:04:20.653933 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Feb 12 22:04:20.653939 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Feb 12 22:04:20.653944 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Feb 12 22:04:20.653949 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Feb 12 22:04:20.653954 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Feb 12 22:04:20.653960 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Feb 12 22:04:20.653966 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Feb 12 22:04:20.653971 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Feb 12 22:04:20.653977 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Feb 12 22:04:20.653982 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Feb 12 22:04:20.653987 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Feb 12 22:04:20.653992 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Feb 12 22:04:20.653997 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Feb 12 22:04:20.654003 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Feb 12 22:04:20.654008 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Feb 12 22:04:20.654013 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Feb 12 22:04:20.654019 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Feb 12 22:04:20.654024 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Feb 12 22:04:20.654029 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Feb 12 22:04:20.654035 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Feb 12 22:04:20.654040 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Feb 12 22:04:20.654045 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Feb 12 22:04:20.654050 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Feb 12 22:04:20.654056 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Feb 12 22:04:20.654061 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Feb 12 22:04:20.654066 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Feb 12 22:04:20.654072 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Feb 12 22:04:20.654077 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Feb 12 22:04:20.654083 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Feb 12 22:04:20.654088 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Feb 12 22:04:20.654093 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Feb 12 22:04:20.654098 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Feb 12 22:04:20.654104 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Feb 12 22:04:20.654109 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Feb 12 22:04:20.654114 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Feb 12 22:04:20.654120 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Feb 12 22:04:20.654126 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Feb 12 22:04:20.654131 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Feb 12 22:04:20.654136 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Feb 12 22:04:20.654141 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Feb 12 22:04:20.654146 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Feb 12 22:04:20.654152 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Feb 12 22:04:20.654157 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Feb 12 22:04:20.654162 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Feb 12 22:04:20.654167 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Feb 12 22:04:20.654173 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Feb 12 22:04:20.654179 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Feb 12 22:04:20.654184 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Feb 12 22:04:20.654189 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Feb 12 22:04:20.654194 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Feb 12 22:04:20.654200 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Feb 12 22:04:20.654205 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Feb 12 22:04:20.654210 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Feb 12 22:04:20.654215 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Feb 12 22:04:20.654220 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Feb 12 22:04:20.654226 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Feb 12 22:04:20.654231 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Feb 12 22:04:20.654237 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Feb 12 22:04:20.654242 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Feb 12 22:04:20.654247 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Feb 12 22:04:20.654252 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Feb 12 22:04:20.654257 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 22:04:20.654263 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 22:04:20.654268 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Feb 12 22:04:20.654274 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Feb 12 22:04:20.654280 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Feb 12 22:04:20.654286 kernel: Zone ranges: Feb 12 22:04:20.654291 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:04:20.654297 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Feb 12 22:04:20.654302 kernel: Normal empty Feb 12 22:04:20.654307 kernel: Movable zone start for each node Feb 12 22:04:20.654312 kernel: Early memory node ranges Feb 12 22:04:20.654318 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Feb 12 22:04:20.654323 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Feb 12 22:04:20.654330 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Feb 12 22:04:20.654335 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Feb 12 22:04:20.654340 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:04:20.654345 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Feb 12 22:04:20.654351 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Feb 12 22:04:20.654356 kernel: ACPI: PM-Timer IO Port: 0x1008 Feb 12 22:04:20.654361 kernel: system APIC only can use physical flat Feb 12 22:04:20.654366 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Feb 12 22:04:20.654372 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 12 22:04:20.654377 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 12 22:04:20.654383 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 12 22:04:20.654388 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 12 22:04:20.654394 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 12 22:04:20.654399 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 12 22:04:20.654404 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 12 22:04:20.654409 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 12 22:04:20.654415 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 12 22:04:20.654420 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 12 22:04:20.654425 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 12 22:04:20.654432 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 12 22:04:20.654437 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 12 22:04:20.654446 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 12 22:04:20.654451 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 12 22:04:20.654456 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 12 22:04:20.654461 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Feb 12 22:04:20.654467 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Feb 12 22:04:20.654472 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Feb 12 22:04:20.654477 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Feb 12 22:04:20.654482 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Feb 12 22:04:20.654489 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Feb 12 22:04:20.654494 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Feb 12 22:04:20.654499 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Feb 12 22:04:20.654504 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Feb 12 22:04:20.654510 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Feb 12 22:04:20.654515 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Feb 12 22:04:20.654520 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Feb 12 22:04:20.654525 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Feb 12 22:04:20.654531 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Feb 12 22:04:20.654537 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Feb 12 22:04:20.654542 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Feb 12 22:04:20.654548 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Feb 12 22:04:20.654553 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Feb 12 22:04:20.654558 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Feb 12 22:04:20.654563 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Feb 12 22:04:20.654568 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Feb 12 22:04:20.654574 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Feb 12 22:04:20.654579 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Feb 12 22:04:20.654585 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Feb 12 22:04:20.654590 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Feb 12 22:04:20.654596 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Feb 12 22:04:20.654601 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Feb 12 22:04:20.654606 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Feb 12 22:04:20.654611 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Feb 12 22:04:20.654616 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Feb 12 22:04:20.654622 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Feb 12 22:04:20.654627 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Feb 12 22:04:20.654632 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Feb 12 22:04:20.654638 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Feb 12 22:04:20.654643 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Feb 12 22:04:20.654649 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Feb 12 22:04:20.654654 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Feb 12 22:04:20.654659 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Feb 12 22:04:20.654664 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Feb 12 22:04:20.654670 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Feb 12 22:04:20.654675 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Feb 12 22:04:20.654680 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Feb 12 22:04:20.654686 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Feb 12 22:04:20.654692 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Feb 12 22:04:20.654697 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Feb 12 22:04:20.654702 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Feb 12 22:04:20.654707 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Feb 12 22:04:20.654713 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Feb 12 22:04:20.654718 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Feb 12 22:04:20.654723 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Feb 12 22:04:20.654728 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Feb 12 22:04:20.654733 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Feb 12 22:04:20.654740 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Feb 12 22:04:20.654745 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Feb 12 22:04:20.654751 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Feb 12 22:04:20.654756 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Feb 12 22:04:20.654761 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Feb 12 22:04:20.654766 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Feb 12 22:04:20.654772 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Feb 12 22:04:20.654777 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Feb 12 22:04:20.654782 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Feb 12 22:04:20.654788 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Feb 12 22:04:20.654794 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Feb 12 22:04:20.654799 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Feb 12 22:04:20.654804 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Feb 12 22:04:20.654809 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Feb 12 22:04:20.654814 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Feb 12 22:04:20.654820 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Feb 12 22:04:20.654825 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Feb 12 22:04:20.654830 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Feb 12 22:04:20.654837 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Feb 12 22:04:20.654843 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Feb 12 22:04:20.654848 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Feb 12 22:04:20.654854 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Feb 12 22:04:20.654859 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Feb 12 22:04:20.654864 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Feb 12 22:04:20.654882 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Feb 12 22:04:20.654888 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Feb 12 22:04:20.654893 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Feb 12 22:04:20.654898 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Feb 12 22:04:20.654905 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Feb 12 22:04:20.654910 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Feb 12 22:04:20.654915 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Feb 12 22:04:20.654920 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Feb 12 22:04:20.654926 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Feb 12 22:04:20.654931 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Feb 12 22:04:20.654936 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Feb 12 22:04:20.654941 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Feb 12 22:04:20.654947 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Feb 12 22:04:20.654953 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Feb 12 22:04:20.654958 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Feb 12 22:04:20.654964 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Feb 12 22:04:20.654969 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Feb 12 22:04:20.654974 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Feb 12 22:04:20.654979 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Feb 12 22:04:20.654985 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Feb 12 22:04:20.654990 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Feb 12 22:04:20.654995 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Feb 12 22:04:20.655000 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Feb 12 22:04:20.655007 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Feb 12 22:04:20.655012 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Feb 12 22:04:20.655018 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Feb 12 22:04:20.655023 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Feb 12 22:04:20.655028 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Feb 12 22:04:20.655033 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Feb 12 22:04:20.655038 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Feb 12 22:04:20.655044 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Feb 12 22:04:20.655049 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Feb 12 22:04:20.655055 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Feb 12 22:04:20.655060 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Feb 12 22:04:20.655065 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Feb 12 22:04:20.655071 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Feb 12 22:04:20.655076 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Feb 12 22:04:20.655081 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:04:20.655087 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Feb 12 22:04:20.655092 kernel: TSC deadline timer available Feb 12 22:04:20.655097 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Feb 12 22:04:20.655103 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Feb 12 22:04:20.655109 kernel: Booting paravirtualized kernel on VMware hypervisor Feb 12 22:04:20.655114 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:04:20.655120 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Feb 12 22:04:20.655125 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 12 22:04:20.655130 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 12 22:04:20.655136 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Feb 12 22:04:20.655141 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Feb 12 22:04:20.655146 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Feb 12 22:04:20.655153 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Feb 12 22:04:20.655158 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Feb 12 22:04:20.655163 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Feb 12 22:04:20.655168 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Feb 12 22:04:20.655181 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Feb 12 22:04:20.655188 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Feb 12 22:04:20.655193 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Feb 12 22:04:20.655199 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Feb 12 22:04:20.655204 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Feb 12 22:04:20.655211 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Feb 12 22:04:20.655217 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Feb 12 22:04:20.655222 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Feb 12 22:04:20.655228 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Feb 12 22:04:20.655234 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Feb 12 22:04:20.655240 kernel: Policy zone: DMA32 Feb 12 22:04:20.655246 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:04:20.655252 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:04:20.655259 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Feb 12 22:04:20.655265 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Feb 12 22:04:20.655271 kernel: printk: log_buf_len min size: 262144 bytes Feb 12 22:04:20.655276 kernel: printk: log_buf_len: 1048576 bytes Feb 12 22:04:20.655282 kernel: printk: early log buf free: 239728(91%) Feb 12 22:04:20.655287 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:04:20.655293 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 22:04:20.655299 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:04:20.655305 kernel: Memory: 1942952K/2096628K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 153416K reserved, 0K cma-reserved) Feb 12 22:04:20.655311 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Feb 12 22:04:20.655317 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:04:20.655323 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:04:20.655329 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:04:20.655335 kernel: rcu: RCU event tracing is enabled. Feb 12 22:04:20.655342 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Feb 12 22:04:20.655348 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:04:20.655353 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:04:20.655359 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:04:20.655365 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Feb 12 22:04:20.655371 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Feb 12 22:04:20.655376 kernel: random: crng init done Feb 12 22:04:20.655382 kernel: Console: colour VGA+ 80x25 Feb 12 22:04:20.655387 kernel: printk: console [tty0] enabled Feb 12 22:04:20.655393 kernel: printk: console [ttyS0] enabled Feb 12 22:04:20.655400 kernel: ACPI: Core revision 20210730 Feb 12 22:04:20.655406 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Feb 12 22:04:20.655411 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:04:20.655417 kernel: x2apic enabled Feb 12 22:04:20.655422 kernel: Switched APIC routing to physical x2apic. Feb 12 22:04:20.655428 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 22:04:20.655434 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 12 22:04:20.655440 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Feb 12 22:04:20.655445 kernel: Disabled fast string operations Feb 12 22:04:20.655452 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:04:20.655458 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:04:20.655464 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:04:20.655470 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 12 22:04:20.655476 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 12 22:04:20.655481 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:04:20.655487 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 12 22:04:20.655493 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 12 22:04:20.655499 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 22:04:20.655505 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 22:04:20.655511 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:04:20.655517 kernel: SRBDS: Unknown: Dependent on hypervisor status Feb 12 22:04:20.655522 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 22:04:20.655528 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:04:20.655534 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:04:20.655540 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:04:20.655545 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:04:20.655552 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 12 22:04:20.655558 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:04:20.655563 kernel: pid_max: default: 131072 minimum: 1024 Feb 12 22:04:20.655569 kernel: LSM: Security Framework initializing Feb 12 22:04:20.655575 kernel: SELinux: Initializing. Feb 12 22:04:20.655580 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:04:20.655586 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:04:20.655592 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 12 22:04:20.655597 kernel: Performance Events: Skylake events, core PMU driver. Feb 12 22:04:20.655604 kernel: core: CPUID marked event: 'cpu cycles' unavailable Feb 12 22:04:20.655611 kernel: core: CPUID marked event: 'instructions' unavailable Feb 12 22:04:20.655616 kernel: core: CPUID marked event: 'bus cycles' unavailable Feb 12 22:04:20.655622 kernel: core: CPUID marked event: 'cache references' unavailable Feb 12 22:04:20.655628 kernel: core: CPUID marked event: 'cache misses' unavailable Feb 12 22:04:20.655634 kernel: core: CPUID marked event: 'branch instructions' unavailable Feb 12 22:04:20.655639 kernel: core: CPUID marked event: 'branch misses' unavailable Feb 12 22:04:20.655645 kernel: ... version: 1 Feb 12 22:04:20.655650 kernel: ... bit width: 48 Feb 12 22:04:20.655657 kernel: ... generic registers: 4 Feb 12 22:04:20.655663 kernel: ... value mask: 0000ffffffffffff Feb 12 22:04:20.655668 kernel: ... max period: 000000007fffffff Feb 12 22:04:20.655674 kernel: ... fixed-purpose events: 0 Feb 12 22:04:20.655680 kernel: ... event mask: 000000000000000f Feb 12 22:04:20.655685 kernel: signal: max sigframe size: 1776 Feb 12 22:04:20.655691 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:04:20.655697 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 22:04:20.655703 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:04:20.655709 kernel: x86: Booting SMP configuration: Feb 12 22:04:20.655715 kernel: .... node #0, CPUs: #1 Feb 12 22:04:20.655720 kernel: Disabled fast string operations Feb 12 22:04:20.655726 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Feb 12 22:04:20.655731 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Feb 12 22:04:20.655737 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 22:04:20.655743 kernel: smpboot: Max logical packages: 128 Feb 12 22:04:20.655748 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Feb 12 22:04:20.655754 kernel: devtmpfs: initialized Feb 12 22:04:20.655760 kernel: x86/mm: Memory block size: 128MB Feb 12 22:04:20.655766 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Feb 12 22:04:20.655772 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:04:20.655778 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Feb 12 22:04:20.655783 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:04:20.655789 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:04:20.655795 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:04:20.655800 kernel: audit: type=2000 audit(1707775459.057:1): state=initialized audit_enabled=0 res=1 Feb 12 22:04:20.655806 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:04:20.655812 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:04:20.655818 kernel: cpuidle: using governor menu Feb 12 22:04:20.655824 kernel: Simple Boot Flag at 0x36 set to 0x80 Feb 12 22:04:20.655829 kernel: ACPI: bus type PCI registered Feb 12 22:04:20.655835 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:04:20.655841 kernel: dca service started, version 1.12.1 Feb 12 22:04:20.655846 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Feb 12 22:04:20.655852 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Feb 12 22:04:20.655858 kernel: PCI: Using configuration type 1 for base access Feb 12 22:04:20.655863 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:04:20.655876 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:04:20.655882 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:04:20.655888 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:04:20.655894 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:04:20.655899 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:04:20.655905 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:04:20.655910 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:04:20.655916 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:04:20.655922 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:04:20.655928 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 22:04:20.655934 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 12 22:04:20.655940 kernel: ACPI: Interpreter enabled Feb 12 22:04:20.655945 kernel: ACPI: PM: (supports S0 S1 S5) Feb 12 22:04:20.655951 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:04:20.655957 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:04:20.655962 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Feb 12 22:04:20.655968 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Feb 12 22:04:20.656043 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:04:20.656093 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Feb 12 22:04:20.656137 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Feb 12 22:04:20.656145 kernel: PCI host bridge to bus 0000:00 Feb 12 22:04:20.656190 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:04:20.656231 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Feb 12 22:04:20.656270 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Feb 12 22:04:20.656311 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Feb 12 22:04:20.656350 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Feb 12 22:04:20.656388 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 12 22:04:20.656429 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:04:20.656467 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Feb 12 22:04:20.656505 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Feb 12 22:04:20.656558 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Feb 12 22:04:20.656612 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Feb 12 22:04:20.656661 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Feb 12 22:04:20.656709 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Feb 12 22:04:20.656755 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Feb 12 22:04:20.656800 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 22:04:20.656844 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 22:04:20.656903 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 22:04:20.656950 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 22:04:20.656999 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Feb 12 22:04:20.657045 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Feb 12 22:04:20.657089 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Feb 12 22:04:20.657139 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Feb 12 22:04:20.657184 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Feb 12 22:04:20.657231 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Feb 12 22:04:20.657280 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Feb 12 22:04:20.657326 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Feb 12 22:04:20.657370 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Feb 12 22:04:20.657414 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Feb 12 22:04:20.657463 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Feb 12 22:04:20.657508 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:04:20.657561 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Feb 12 22:04:20.657621 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.657675 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660163 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660223 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660279 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660334 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660389 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660440 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660497 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660547 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660616 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660668 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660720 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660770 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660821 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660879 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.660933 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.660984 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661038 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661087 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661140 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661189 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661244 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661293 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661344 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661392 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661443 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661492 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661543 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661593 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661665 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661715 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661769 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661819 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661880 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.661937 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.661993 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.662043 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.662095 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.662144 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.662197 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.662249 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.671830 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.672549 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.672605 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.672654 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.672707 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.672758 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.672809 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.672854 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.672913 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.672959 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673010 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.673057 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673108 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.673153 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673201 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.673247 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673296 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.673343 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673393 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.673439 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673488 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:04:20.673534 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.673583 kernel: pci_bus 0000:01: extended config space not accessible Feb 12 22:04:20.673631 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 22:04:20.673681 kernel: pci_bus 0000:02: extended config space not accessible Feb 12 22:04:20.673689 kernel: acpiphp: Slot [32] registered Feb 12 22:04:20.673695 kernel: acpiphp: Slot [33] registered Feb 12 22:04:20.673701 kernel: acpiphp: Slot [34] registered Feb 12 22:04:20.673707 kernel: acpiphp: Slot [35] registered Feb 12 22:04:20.673713 kernel: acpiphp: Slot [36] registered Feb 12 22:04:20.673719 kernel: acpiphp: Slot [37] registered Feb 12 22:04:20.673724 kernel: acpiphp: Slot [38] registered Feb 12 22:04:20.673730 kernel: acpiphp: Slot [39] registered Feb 12 22:04:20.673737 kernel: acpiphp: Slot [40] registered Feb 12 22:04:20.673743 kernel: acpiphp: Slot [41] registered Feb 12 22:04:20.673749 kernel: acpiphp: Slot [42] registered Feb 12 22:04:20.673755 kernel: acpiphp: Slot [43] registered Feb 12 22:04:20.673761 kernel: acpiphp: Slot [44] registered Feb 12 22:04:20.673767 kernel: acpiphp: Slot [45] registered Feb 12 22:04:20.673772 kernel: acpiphp: Slot [46] registered Feb 12 22:04:20.673778 kernel: acpiphp: Slot [47] registered Feb 12 22:04:20.673784 kernel: acpiphp: Slot [48] registered Feb 12 22:04:20.673791 kernel: acpiphp: Slot [49] registered Feb 12 22:04:20.673797 kernel: acpiphp: Slot [50] registered Feb 12 22:04:20.673803 kernel: acpiphp: Slot [51] registered Feb 12 22:04:20.673808 kernel: acpiphp: Slot [52] registered Feb 12 22:04:20.673814 kernel: acpiphp: Slot [53] registered Feb 12 22:04:20.673820 kernel: acpiphp: Slot [54] registered Feb 12 22:04:20.673826 kernel: acpiphp: Slot [55] registered Feb 12 22:04:20.673831 kernel: acpiphp: Slot [56] registered Feb 12 22:04:20.673837 kernel: acpiphp: Slot [57] registered Feb 12 22:04:20.673843 kernel: acpiphp: Slot [58] registered Feb 12 22:04:20.673849 kernel: acpiphp: Slot [59] registered Feb 12 22:04:20.673855 kernel: acpiphp: Slot [60] registered Feb 12 22:04:20.673861 kernel: acpiphp: Slot [61] registered Feb 12 22:04:20.673866 kernel: acpiphp: Slot [62] registered Feb 12 22:04:20.673880 kernel: acpiphp: Slot [63] registered Feb 12 22:04:20.673933 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Feb 12 22:04:20.673979 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 12 22:04:20.674024 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 12 22:04:20.674070 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 22:04:20.674115 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Feb 12 22:04:20.674161 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Feb 12 22:04:20.674204 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Feb 12 22:04:20.674249 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Feb 12 22:04:20.674293 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Feb 12 22:04:20.674338 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Feb 12 22:04:20.674383 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Feb 12 22:04:20.674430 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Feb 12 22:04:20.674489 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Feb 12 22:04:20.674536 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Feb 12 22:04:20.674583 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Feb 12 22:04:20.674629 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 12 22:04:20.674675 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 12 22:04:20.674721 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 12 22:04:20.674771 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 12 22:04:20.674816 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 12 22:04:20.674861 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 12 22:04:20.674915 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 12 22:04:20.674960 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 12 22:04:20.675005 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 12 22:04:20.677935 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 22:04:20.677997 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 12 22:04:20.678051 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 12 22:04:20.678098 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 12 22:04:20.678145 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 22:04:20.678194 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 12 22:04:20.678240 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 12 22:04:20.678285 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 22:04:20.678334 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 12 22:04:20.678380 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 12 22:04:20.678424 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 22:04:20.678486 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 12 22:04:20.678532 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 12 22:04:20.678577 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 22:04:20.678626 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 12 22:04:20.678671 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 12 22:04:20.678715 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 22:04:20.678760 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 12 22:04:20.678805 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 12 22:04:20.678849 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 22:04:20.678912 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Feb 12 22:04:20.678964 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Feb 12 22:04:20.679011 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Feb 12 22:04:20.679058 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Feb 12 22:04:20.679104 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Feb 12 22:04:20.679151 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 12 22:04:20.679198 kernel: pci 0000:0b:00.0: supports D1 D2 Feb 12 22:04:20.679244 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 22:04:20.679290 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 12 22:04:20.679339 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 12 22:04:20.679384 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 12 22:04:20.679430 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 12 22:04:20.679476 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 12 22:04:20.679521 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 12 22:04:20.679566 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 12 22:04:20.679611 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 22:04:20.679658 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 12 22:04:20.679705 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 12 22:04:20.679751 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 12 22:04:20.679796 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 22:04:20.679843 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 12 22:04:20.679895 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 12 22:04:20.679941 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 22:04:20.679988 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 12 22:04:20.680036 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 12 22:04:20.680080 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 22:04:20.680126 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 12 22:04:20.680171 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 12 22:04:20.680216 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 22:04:20.680263 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 12 22:04:20.680308 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 12 22:04:20.680353 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 22:04:20.680401 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 12 22:04:20.680445 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 12 22:04:20.680490 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 22:04:20.680536 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 12 22:04:20.680580 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 12 22:04:20.680625 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 12 22:04:20.680670 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 22:04:20.680717 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 12 22:04:20.680765 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 12 22:04:20.680809 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 12 22:04:20.680854 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 22:04:20.680915 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 12 22:04:20.680961 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 12 22:04:20.681006 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 12 22:04:20.681051 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 22:04:20.681098 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 12 22:04:20.681145 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 12 22:04:20.681189 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 22:04:20.681235 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 12 22:04:20.681280 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 12 22:04:20.681325 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 22:04:20.681371 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 12 22:04:20.681415 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 12 22:04:20.681464 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 22:04:20.681512 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 12 22:04:20.681556 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 12 22:04:20.681600 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 22:04:20.681652 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 12 22:04:20.681705 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 12 22:04:20.681752 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 22:04:20.681798 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 12 22:04:20.681843 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 12 22:04:20.681898 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 12 22:04:20.681943 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 22:04:20.681988 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 12 22:04:20.682034 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 12 22:04:20.682079 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 12 22:04:20.682124 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 22:04:20.682170 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 12 22:04:20.682218 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 12 22:04:20.682263 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 22:04:20.682309 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 12 22:04:20.682354 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 12 22:04:20.682403 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 22:04:20.682450 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 12 22:04:20.682495 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 12 22:04:20.682539 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 22:04:20.682587 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 12 22:04:20.682632 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 12 22:04:20.682676 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 22:04:20.682721 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 12 22:04:20.682766 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 12 22:04:20.682810 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 22:04:20.682856 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 12 22:04:20.682909 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 12 22:04:20.682956 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 22:04:20.682964 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Feb 12 22:04:20.682970 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Feb 12 22:04:20.683082 kernel: ACPI: PCI: Interrupt link LNKB disabled Feb 12 22:04:20.683090 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 22:04:20.683096 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Feb 12 22:04:20.683102 kernel: iommu: Default domain type: Translated Feb 12 22:04:20.683108 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:04:20.683162 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Feb 12 22:04:20.683212 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:04:20.683258 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Feb 12 22:04:20.683267 kernel: vgaarb: loaded Feb 12 22:04:20.683273 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:04:20.683280 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:04:20.683285 kernel: PTP clock support registered Feb 12 22:04:20.683291 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:04:20.683297 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:04:20.683303 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Feb 12 22:04:20.683310 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Feb 12 22:04:20.683317 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Feb 12 22:04:20.683322 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Feb 12 22:04:20.683328 kernel: clocksource: Switched to clocksource tsc-early Feb 12 22:04:20.683334 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:04:20.683340 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:04:20.683346 kernel: pnp: PnP ACPI init Feb 12 22:04:20.683394 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Feb 12 22:04:20.683439 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Feb 12 22:04:20.683480 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Feb 12 22:04:20.683525 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Feb 12 22:04:20.683570 kernel: pnp 00:06: [dma 2] Feb 12 22:04:20.683616 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Feb 12 22:04:20.683658 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Feb 12 22:04:20.683699 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Feb 12 22:04:20.683709 kernel: pnp: PnP ACPI: found 8 devices Feb 12 22:04:20.683716 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:04:20.683724 kernel: NET: Registered PF_INET protocol family Feb 12 22:04:20.683733 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 22:04:20.683740 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 22:04:20.683746 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:04:20.683752 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 22:04:20.683758 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:04:20.683765 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 22:04:20.683771 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:04:20.683777 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:04:20.683783 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:04:20.683789 kernel: NET: Registered PF_XDP protocol family Feb 12 22:04:20.683840 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Feb 12 22:04:20.683936 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Feb 12 22:04:20.683984 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Feb 12 22:04:20.684033 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Feb 12 22:04:20.684080 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Feb 12 22:04:20.684126 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Feb 12 22:04:20.684173 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Feb 12 22:04:20.684220 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Feb 12 22:04:20.684267 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Feb 12 22:04:20.684315 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Feb 12 22:04:20.684361 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Feb 12 22:04:20.684407 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Feb 12 22:04:20.684458 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Feb 12 22:04:20.684504 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Feb 12 22:04:20.684550 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Feb 12 22:04:20.684597 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Feb 12 22:04:20.684642 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Feb 12 22:04:20.684997 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Feb 12 22:04:20.685049 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Feb 12 22:04:20.685097 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Feb 12 22:04:20.685147 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Feb 12 22:04:20.685193 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Feb 12 22:04:20.685238 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Feb 12 22:04:20.685283 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 22:04:20.685329 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 22:04:20.685374 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.685419 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.685474 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.685534 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.685579 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.685624 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.685668 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.685714 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.685759 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.685804 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.685851 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.686344 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.686397 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.686445 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.686491 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.686536 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.686582 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.686931 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687003 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687057 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687108 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687157 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687206 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687255 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687304 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687353 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687405 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687453 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687503 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687558 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687621 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687670 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687719 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687767 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687819 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.687928 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.687982 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688038 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688099 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688148 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688198 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688246 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688512 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688566 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688613 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688659 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688703 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688749 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688793 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688838 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688893 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.688939 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.688988 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689033 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689078 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689123 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689170 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689214 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689260 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689304 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689350 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689398 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689442 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689487 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689533 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689577 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689621 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689666 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689711 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689756 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689801 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689848 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.689914 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.689961 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.690006 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.690052 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.690102 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.690148 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.690203 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.690249 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.690296 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.690341 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.690386 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 12 22:04:20.690431 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:04:20.690476 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 22:04:20.690538 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Feb 12 22:04:20.690583 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 12 22:04:20.690628 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 12 22:04:20.690671 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 22:04:20.690722 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Feb 12 22:04:20.690767 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 12 22:04:20.690812 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 12 22:04:20.690856 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 12 22:04:20.691217 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 22:04:20.691268 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 12 22:04:20.691315 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 12 22:04:20.691360 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 12 22:04:20.691405 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 22:04:20.691476 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 12 22:04:20.691810 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 12 22:04:20.691863 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 12 22:04:20.691923 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 22:04:20.691969 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 12 22:04:20.692882 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 12 22:04:20.692937 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 22:04:20.692988 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 12 22:04:20.693038 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 12 22:04:20.693087 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 22:04:20.693141 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 12 22:04:20.693189 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 12 22:04:20.693234 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 22:04:20.693280 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 12 22:04:20.693325 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 12 22:04:20.697414 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 22:04:20.697468 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 12 22:04:20.697521 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 12 22:04:20.697569 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 22:04:20.697625 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Feb 12 22:04:20.697687 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 12 22:04:20.697734 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 12 22:04:20.697779 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 12 22:04:20.697840 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 22:04:20.697898 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 12 22:04:20.697945 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 12 22:04:20.697991 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 12 22:04:20.698035 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 22:04:20.698082 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 12 22:04:20.698128 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 12 22:04:20.698173 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 12 22:04:20.698219 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 22:04:20.698266 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 12 22:04:20.698311 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 12 22:04:20.698360 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 22:04:20.698406 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 12 22:04:20.698462 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 12 22:04:20.698509 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 22:04:20.698556 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 12 22:04:20.698601 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 12 22:04:20.698645 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 22:04:20.698690 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 12 22:04:20.698735 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 12 22:04:20.698783 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 22:04:20.698829 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 12 22:04:20.699098 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 12 22:04:20.699167 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 22:04:20.699219 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 12 22:04:20.699283 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 12 22:04:20.699541 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 12 22:04:20.699605 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 22:04:20.699657 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 12 22:04:20.699717 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 12 22:04:20.699770 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 12 22:04:20.699815 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 22:04:20.699863 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 12 22:04:20.700153 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 12 22:04:20.700223 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 12 22:04:20.700278 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 22:04:20.700326 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 12 22:04:20.700372 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 12 22:04:20.700418 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 22:04:20.700468 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 12 22:04:20.700514 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 12 22:04:20.700561 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 22:04:20.700607 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 12 22:04:20.700653 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 12 22:04:20.700705 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 22:04:20.700752 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 12 22:04:20.700797 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 12 22:04:20.700842 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 22:04:20.700934 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 12 22:04:20.700983 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 12 22:04:20.701028 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 22:04:20.701074 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 12 22:04:20.701119 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 12 22:04:20.701164 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 12 22:04:20.701384 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 22:04:20.701434 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 12 22:04:20.701486 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 12 22:04:20.701814 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 12 22:04:20.701881 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 22:04:20.701935 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 12 22:04:20.702135 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 12 22:04:20.702189 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 22:04:20.702239 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 12 22:04:20.702285 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 12 22:04:20.702332 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 22:04:20.702590 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 12 22:04:20.702642 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 12 22:04:20.702689 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 22:04:20.702744 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 12 22:04:20.702790 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 12 22:04:20.702837 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 22:04:20.703165 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 12 22:04:20.703219 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 12 22:04:20.703552 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 22:04:20.703814 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 12 22:04:20.703876 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 12 22:04:20.703940 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 22:04:20.703998 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Feb 12 22:04:20.704043 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Feb 12 22:04:20.704083 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 12 22:04:20.704124 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 12 22:04:20.704163 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 12 22:04:20.704203 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 12 22:04:20.704243 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Feb 12 22:04:20.704285 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Feb 12 22:04:20.704330 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Feb 12 22:04:20.704373 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Feb 12 22:04:20.704415 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 22:04:20.704460 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Feb 12 22:04:20.704502 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Feb 12 22:04:20.704544 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 12 22:04:20.704587 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 12 22:04:20.704628 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 12 22:04:20.704669 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 12 22:04:20.704709 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Feb 12 22:04:20.704751 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Feb 12 22:04:20.704798 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Feb 12 22:04:20.704840 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Feb 12 22:04:20.705120 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 22:04:20.705176 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Feb 12 22:04:20.705221 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Feb 12 22:04:20.705262 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 22:04:20.705316 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Feb 12 22:04:20.705359 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Feb 12 22:04:20.705401 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 22:04:20.705446 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Feb 12 22:04:20.705491 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 22:04:20.705536 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Feb 12 22:04:20.705577 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 22:04:20.705626 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Feb 12 22:04:20.705676 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 22:04:20.705725 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Feb 12 22:04:20.705767 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 22:04:20.705813 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Feb 12 22:04:20.705855 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 22:04:20.706121 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Feb 12 22:04:20.706169 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Feb 12 22:04:20.706216 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 22:04:20.706267 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Feb 12 22:04:20.706312 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Feb 12 22:04:20.706353 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 22:04:20.706399 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Feb 12 22:04:20.706443 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Feb 12 22:04:20.706484 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 22:04:20.706532 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Feb 12 22:04:20.706575 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 22:04:20.706621 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Feb 12 22:04:20.706664 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 22:04:20.706711 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Feb 12 22:04:20.706754 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 22:04:20.706805 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Feb 12 22:04:20.706848 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 22:04:20.707161 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Feb 12 22:04:20.707210 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 22:04:20.707256 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Feb 12 22:04:20.707299 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Feb 12 22:04:20.707340 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 22:04:20.707388 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Feb 12 22:04:20.707431 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Feb 12 22:04:20.707476 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 22:04:20.707521 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Feb 12 22:04:20.707563 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Feb 12 22:04:20.707605 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 22:04:20.707650 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Feb 12 22:04:20.707695 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 22:04:20.707740 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Feb 12 22:04:20.707782 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 22:04:20.707830 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Feb 12 22:04:20.707880 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 22:04:20.707927 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Feb 12 22:04:20.707973 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 22:04:20.708023 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Feb 12 22:04:20.708065 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 22:04:20.708111 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Feb 12 22:04:20.708154 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Feb 12 22:04:20.708198 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 22:04:20.708244 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Feb 12 22:04:20.708288 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Feb 12 22:04:20.708330 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 22:04:20.708376 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Feb 12 22:04:20.708418 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 22:04:20.708479 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Feb 12 22:04:20.708525 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 22:04:20.708571 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Feb 12 22:04:20.708613 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 22:04:20.708659 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Feb 12 22:04:20.708701 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 22:04:20.708746 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Feb 12 22:04:20.708791 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 22:04:20.708836 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Feb 12 22:04:20.716063 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 22:04:20.716124 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 22:04:20.716134 kernel: PCI: CLS 32 bytes, default 64 Feb 12 22:04:20.716141 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 22:04:20.716147 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 12 22:04:20.716156 kernel: clocksource: Switched to clocksource tsc Feb 12 22:04:20.716163 kernel: Initialise system trusted keyrings Feb 12 22:04:20.716169 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 22:04:20.716176 kernel: Key type asymmetric registered Feb 12 22:04:20.716182 kernel: Asymmetric key parser 'x509' registered Feb 12 22:04:20.716188 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:04:20.716194 kernel: io scheduler mq-deadline registered Feb 12 22:04:20.716200 kernel: io scheduler kyber registered Feb 12 22:04:20.716207 kernel: io scheduler bfq registered Feb 12 22:04:20.716258 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Feb 12 22:04:20.716307 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.716355 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Feb 12 22:04:20.716401 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.716452 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Feb 12 22:04:20.716500 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.716547 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Feb 12 22:04:20.716594 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.716643 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Feb 12 22:04:20.716690 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.716737 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Feb 12 22:04:20.716784 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.716830 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Feb 12 22:04:20.717907 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.717966 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Feb 12 22:04:20.718016 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718065 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Feb 12 22:04:20.718111 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718159 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Feb 12 22:04:20.718208 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718255 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Feb 12 22:04:20.718300 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718347 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Feb 12 22:04:20.718393 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718440 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Feb 12 22:04:20.718503 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718550 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Feb 12 22:04:20.718596 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718643 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Feb 12 22:04:20.718691 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718739 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Feb 12 22:04:20.718784 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718830 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Feb 12 22:04:20.718883 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.718930 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Feb 12 22:04:20.718976 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719023 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Feb 12 22:04:20.719070 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719117 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Feb 12 22:04:20.719163 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719211 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Feb 12 22:04:20.719256 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719303 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Feb 12 22:04:20.719352 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719399 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Feb 12 22:04:20.719444 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719490 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Feb 12 22:04:20.719536 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719585 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Feb 12 22:04:20.719630 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719675 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Feb 12 22:04:20.719720 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719766 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Feb 12 22:04:20.719812 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.719860 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Feb 12 22:04:20.721409 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.721459 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Feb 12 22:04:20.721506 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.721553 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Feb 12 22:04:20.721599 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.721648 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Feb 12 22:04:20.721695 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.721742 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Feb 12 22:04:20.721787 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:04:20.721796 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:04:20.721805 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:04:20.721811 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:04:20.721817 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Feb 12 22:04:20.721823 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 22:04:20.721830 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 22:04:20.722530 kernel: rtc_cmos 00:01: registered as rtc0 Feb 12 22:04:20.722543 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 22:04:20.722588 kernel: rtc_cmos 00:01: setting system clock to 2024-02-12T22:04:20 UTC (1707775460) Feb 12 22:04:20.722634 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Feb 12 22:04:20.722643 kernel: fail to initialize ptp_kvm Feb 12 22:04:20.722649 kernel: intel_pstate: CPU model not supported Feb 12 22:04:20.722655 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:04:20.722661 kernel: Segment Routing with IPv6 Feb 12 22:04:20.722667 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:04:20.722674 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:04:20.722680 kernel: Key type dns_resolver registered Feb 12 22:04:20.722686 kernel: IPI shorthand broadcast: enabled Feb 12 22:04:20.722694 kernel: sched_clock: Marking stable (890264895, 220363786)->(1173919415, -63290734) Feb 12 22:04:20.722700 kernel: registered taskstats version 1 Feb 12 22:04:20.722707 kernel: Loading compiled-in X.509 certificates Feb 12 22:04:20.722713 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:04:20.722719 kernel: Key type .fscrypt registered Feb 12 22:04:20.722725 kernel: Key type fscrypt-provisioning registered Feb 12 22:04:20.722731 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 22:04:20.722737 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:04:20.722744 kernel: ima: No architecture policies found Feb 12 22:04:20.722752 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:04:20.722758 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:04:20.722764 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:04:20.722770 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:04:20.722777 kernel: Run /init as init process Feb 12 22:04:20.722783 kernel: with arguments: Feb 12 22:04:20.722789 kernel: /init Feb 12 22:04:20.722795 kernel: with environment: Feb 12 22:04:20.722801 kernel: HOME=/ Feb 12 22:04:20.722808 kernel: TERM=linux Feb 12 22:04:20.722814 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:04:20.722822 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:04:20.722830 systemd[1]: Detected virtualization vmware. Feb 12 22:04:20.722837 systemd[1]: Detected architecture x86-64. Feb 12 22:04:20.722843 systemd[1]: Running in initrd. Feb 12 22:04:20.722849 systemd[1]: No hostname configured, using default hostname. Feb 12 22:04:20.722855 systemd[1]: Hostname set to . Feb 12 22:04:20.722863 systemd[1]: Initializing machine ID from random generator. Feb 12 22:04:20.722884 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:04:20.722892 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:04:20.722898 systemd[1]: Reached target cryptsetup.target. Feb 12 22:04:20.722904 systemd[1]: Reached target paths.target. Feb 12 22:04:20.722910 systemd[1]: Reached target slices.target. Feb 12 22:04:20.722916 systemd[1]: Reached target swap.target. Feb 12 22:04:20.722923 systemd[1]: Reached target timers.target. Feb 12 22:04:20.722932 systemd[1]: Listening on iscsid.socket. Feb 12 22:04:20.722938 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:04:20.722945 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:04:20.722951 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:04:20.722958 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:04:20.722964 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:04:20.722971 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:04:20.722977 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:04:20.722984 systemd[1]: Reached target sockets.target. Feb 12 22:04:20.722991 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:04:20.722997 systemd[1]: Finished network-cleanup.service. Feb 12 22:04:20.723004 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:04:20.723010 systemd[1]: Starting systemd-journald.service... Feb 12 22:04:20.723017 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:04:20.723023 systemd[1]: Starting systemd-resolved.service... Feb 12 22:04:20.723029 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:04:20.723036 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:04:20.723043 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:04:20.723049 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:04:20.723056 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:04:20.723062 kernel: audit: type=1130 audit(1707775460.664:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.723069 systemd[1]: Started systemd-resolved.service. Feb 12 22:04:20.723075 kernel: audit: type=1130 audit(1707775460.668:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.723081 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:04:20.723088 kernel: audit: type=1130 audit(1707775460.671:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.723095 systemd[1]: Reached target nss-lookup.target. Feb 12 22:04:20.723102 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:04:20.723108 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:04:20.723114 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:04:20.723121 kernel: Bridge firewalling registered Feb 12 22:04:20.723127 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:04:20.723135 kernel: audit: type=1130 audit(1707775460.691:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.723141 kernel: SCSI subsystem initialized Feb 12 22:04:20.723147 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:04:20.723153 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:04:20.723164 systemd-journald[216]: Journal started Feb 12 22:04:20.723199 systemd-journald[216]: Runtime Journal (/run/log/journal/1c2a2639e3c04216a674acc68f888494) is 4.8M, max 38.8M, 34.0M free. Feb 12 22:04:20.727468 systemd[1]: Started systemd-journald.service. Feb 12 22:04:20.727484 kernel: audit: type=1130 audit(1707775460.722:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.727493 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:04:20.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.662687 systemd-resolved[218]: Positive Trust Anchors: Feb 12 22:04:20.662696 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:04:20.662715 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:04:20.664386 systemd-resolved[218]: Defaulting to hostname 'linux'. Feb 12 22:04:20.665921 systemd-modules-load[217]: Inserted module 'overlay' Feb 12 22:04:20.693367 systemd-modules-load[217]: Inserted module 'br_netfilter' Feb 12 22:04:20.730668 dracut-cmdline[233]: dracut-dracut-053 Feb 12 22:04:20.730668 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 12 22:04:20.730668 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:04:20.732096 systemd-modules-load[217]: Inserted module 'dm_multipath' Feb 12 22:04:20.736446 kernel: audit: type=1130 audit(1707775460.730:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.732569 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:04:20.733041 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:04:20.738904 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:04:20.745884 kernel: iscsi: registered transport (tcp) Feb 12 22:04:20.745865 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:04:20.748420 kernel: audit: type=1130 audit(1707775460.744:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.762302 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:04:20.762330 kernel: QLogic iSCSI HBA Driver Feb 12 22:04:20.778235 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:04:20.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.778845 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:04:20.781882 kernel: audit: type=1130 audit(1707775460.776:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:20.815888 kernel: raid6: avx2x4 gen() 48290 MB/s Feb 12 22:04:20.832895 kernel: raid6: avx2x4 xor() 20989 MB/s Feb 12 22:04:20.849893 kernel: raid6: avx2x2 gen() 53255 MB/s Feb 12 22:04:20.866890 kernel: raid6: avx2x2 xor() 31831 MB/s Feb 12 22:04:20.883890 kernel: raid6: avx2x1 gen() 43712 MB/s Feb 12 22:04:20.900917 kernel: raid6: avx2x1 xor() 27628 MB/s Feb 12 22:04:20.917885 kernel: raid6: sse2x4 gen() 20988 MB/s Feb 12 22:04:20.934884 kernel: raid6: sse2x4 xor() 11617 MB/s Feb 12 22:04:20.951880 kernel: raid6: sse2x2 gen() 21484 MB/s Feb 12 22:04:20.968889 kernel: raid6: sse2x2 xor() 12889 MB/s Feb 12 22:04:20.985895 kernel: raid6: sse2x1 gen() 18067 MB/s Feb 12 22:04:21.003093 kernel: raid6: sse2x1 xor() 8726 MB/s Feb 12 22:04:21.003134 kernel: raid6: using algorithm avx2x2 gen() 53255 MB/s Feb 12 22:04:21.003143 kernel: raid6: .... xor() 31831 MB/s, rmw enabled Feb 12 22:04:21.004310 kernel: raid6: using avx2x2 recovery algorithm Feb 12 22:04:21.012887 kernel: xor: automatically using best checksumming function avx Feb 12 22:04:21.072888 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:04:21.077412 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:04:21.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:21.078043 systemd[1]: Starting systemd-udevd.service... Feb 12 22:04:21.075000 audit: BPF prog-id=7 op=LOAD Feb 12 22:04:21.075000 audit: BPF prog-id=8 op=LOAD Feb 12 22:04:21.082883 kernel: audit: type=1130 audit(1707775461.075:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:21.087910 systemd-udevd[416]: Using default interface naming scheme 'v252'. Feb 12 22:04:21.090526 systemd[1]: Started systemd-udevd.service. Feb 12 22:04:21.091029 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:04:21.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:21.098389 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation Feb 12 22:04:21.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:21.114370 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:04:21.114903 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:04:21.184997 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:04:21.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:21.236436 kernel: VMware PVSCSI driver - version 1.0.7.0-k Feb 12 22:04:21.236474 kernel: vmw_pvscsi: using 64bit dma Feb 12 22:04:21.236482 kernel: vmw_pvscsi: max_id: 16 Feb 12 22:04:21.236493 kernel: vmw_pvscsi: setting ring_pages to 8 Feb 12 22:04:21.245975 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Feb 12 22:04:21.246005 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Feb 12 22:04:21.251201 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Feb 12 22:04:21.251409 kernel: vmw_pvscsi: enabling reqCallThreshold Feb 12 22:04:21.251419 kernel: vmw_pvscsi: driver-based request coalescing enabled Feb 12 22:04:21.251428 kernel: vmw_pvscsi: using MSI-X Feb 12 22:04:21.260944 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Feb 12 22:04:21.261111 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Feb 12 22:04:21.266946 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Feb 12 22:04:21.280890 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:04:21.282883 kernel: libata version 3.00 loaded. Feb 12 22:04:21.288489 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:04:21.288525 kernel: AES CTR mode by8 optimization enabled Feb 12 22:04:21.291065 kernel: ata_piix 0000:00:07.1: version 2.13 Feb 12 22:04:21.291171 kernel: scsi host1: ata_piix Feb 12 22:04:21.291881 kernel: scsi host2: ata_piix Feb 12 22:04:21.294628 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Feb 12 22:04:21.294646 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Feb 12 22:04:21.294725 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Feb 12 22:04:21.459892 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Feb 12 22:04:21.465121 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Feb 12 22:04:21.475375 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Feb 12 22:04:21.475507 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 22:04:21.475572 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Feb 12 22:04:21.475631 kernel: sd 0:0:0:0: [sda] Cache data unavailable Feb 12 22:04:21.475688 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Feb 12 22:04:21.506451 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:04:21.506479 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 22:04:21.527655 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Feb 12 22:04:21.527815 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 22:04:21.539233 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:04:21.540885 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (473) Feb 12 22:04:21.541885 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Feb 12 22:04:21.544475 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:04:21.550171 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:04:21.550471 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:04:21.552875 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:04:21.553602 systemd[1]: Starting disk-uuid.service... Feb 12 22:04:21.613895 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:04:21.618888 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:04:22.622425 disk-uuid[549]: The operation has completed successfully. Feb 12 22:04:22.625311 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:04:22.677224 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:04:22.677275 systemd[1]: Finished disk-uuid.service. Feb 12 22:04:22.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:22.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:22.677830 systemd[1]: Starting verity-setup.service... Feb 12 22:04:22.699884 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:04:22.788826 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:04:22.789571 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:04:22.789915 systemd[1]: Finished verity-setup.service. Feb 12 22:04:22.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:22.853318 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:04:22.854879 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:04:22.853866 systemd[1]: Starting afterburn-network-kargs.service... Feb 12 22:04:22.854326 systemd[1]: Starting ignition-setup.service... Feb 12 22:04:22.919408 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:04:22.919446 kernel: BTRFS info (device sda6): using free space tree Feb 12 22:04:22.919454 kernel: BTRFS info (device sda6): has skinny extents Feb 12 22:04:22.927886 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 22:04:22.934954 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 22:04:22.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:22.942228 systemd[1]: Finished ignition-setup.service. Feb 12 22:04:22.942897 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:04:23.000605 systemd[1]: Finished afterburn-network-kargs.service. Feb 12 22:04:22.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.001465 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:04:23.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.036000 audit: BPF prog-id=9 op=LOAD Feb 12 22:04:23.037835 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:04:23.038696 systemd[1]: Starting systemd-networkd.service... Feb 12 22:04:23.051193 systemd-networkd[733]: lo: Link UP Feb 12 22:04:23.051199 systemd-networkd[733]: lo: Gained carrier Feb 12 22:04:23.051450 systemd-networkd[733]: Enumeration completed Feb 12 22:04:23.054674 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 12 22:04:23.054804 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 12 22:04:23.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.051643 systemd-networkd[733]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Feb 12 22:04:23.051705 systemd[1]: Started systemd-networkd.service. Feb 12 22:04:23.051839 systemd[1]: Reached target network.target. Feb 12 22:04:23.052324 systemd[1]: Starting iscsiuio.service... Feb 12 22:04:23.055107 systemd-networkd[733]: ens192: Link UP Feb 12 22:04:23.055109 systemd-networkd[733]: ens192: Gained carrier Feb 12 22:04:23.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.057104 systemd[1]: Started iscsiuio.service. Feb 12 22:04:23.057761 systemd[1]: Starting iscsid.service... Feb 12 22:04:23.059749 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:04:23.059749 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:04:23.059749 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:04:23.059749 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:04:23.059749 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:04:23.059749 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:04:23.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.060846 systemd[1]: Started iscsid.service. Feb 12 22:04:23.061356 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:04:23.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.067615 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:04:23.067752 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:04:23.067842 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:04:23.067950 systemd[1]: Reached target remote-fs.target. Feb 12 22:04:23.068506 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:04:23.073623 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:04:23.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.224134 ignition[604]: Ignition 2.14.0 Feb 12 22:04:23.224143 ignition[604]: Stage: fetch-offline Feb 12 22:04:23.224179 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:04:23.224200 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:04:23.227328 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:04:23.227399 ignition[604]: parsed url from cmdline: "" Feb 12 22:04:23.227401 ignition[604]: no config URL provided Feb 12 22:04:23.227405 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:04:23.227412 ignition[604]: no config at "/usr/lib/ignition/user.ign" Feb 12 22:04:23.233084 ignition[604]: config successfully fetched Feb 12 22:04:23.233125 ignition[604]: parsing config with SHA512: 5e5459f05912de0ddc12ade914d647feda2e5b4a4101ac5f3fa21a4cb5717b0d900da3c14b5b5d8ed72a1c026c31fd2f11466db5ea49d45509c79e74b73da482 Feb 12 22:04:23.261470 unknown[604]: fetched base config from "system" Feb 12 22:04:23.261479 unknown[604]: fetched user config from "vmware" Feb 12 22:04:23.261962 ignition[604]: fetch-offline: fetch-offline passed Feb 12 22:04:23.262013 ignition[604]: Ignition finished successfully Feb 12 22:04:23.262724 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:04:23.262900 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 22:04:23.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.263349 systemd[1]: Starting ignition-kargs.service... Feb 12 22:04:23.268399 ignition[753]: Ignition 2.14.0 Feb 12 22:04:23.268405 ignition[753]: Stage: kargs Feb 12 22:04:23.268477 ignition[753]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:04:23.268487 ignition[753]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:04:23.269891 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:04:23.271393 ignition[753]: kargs: kargs passed Feb 12 22:04:23.271422 ignition[753]: Ignition finished successfully Feb 12 22:04:23.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.272373 systemd[1]: Finished ignition-kargs.service. Feb 12 22:04:23.272934 systemd[1]: Starting ignition-disks.service... Feb 12 22:04:23.277018 ignition[759]: Ignition 2.14.0 Feb 12 22:04:23.277214 ignition[759]: Stage: disks Feb 12 22:04:23.277383 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:04:23.277538 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:04:23.278823 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:04:23.280554 ignition[759]: disks: disks passed Feb 12 22:04:23.280589 ignition[759]: Ignition finished successfully Feb 12 22:04:23.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.281167 systemd[1]: Finished ignition-disks.service. Feb 12 22:04:23.281306 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:04:23.281399 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:04:23.281483 systemd[1]: Reached target local-fs.target. Feb 12 22:04:23.281564 systemd[1]: Reached target sysinit.target. Feb 12 22:04:23.281642 systemd[1]: Reached target basic.target. Feb 12 22:04:23.282186 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:04:23.316550 systemd-fsck[767]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 22:04:23.318251 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:04:23.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.318999 systemd[1]: Mounting sysroot.mount... Feb 12 22:04:23.328844 systemd[1]: Mounted sysroot.mount. Feb 12 22:04:23.329148 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:04:23.329050 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:04:23.330138 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:04:23.330591 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 22:04:23.330618 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:04:23.330637 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:04:23.333426 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:04:23.334204 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:04:23.337864 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:04:23.342623 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:04:23.345264 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:04:23.347620 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:04:23.375679 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:04:23.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.376268 systemd[1]: Starting ignition-mount.service... Feb 12 22:04:23.376719 systemd[1]: Starting sysroot-boot.service... Feb 12 22:04:23.380427 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 22:04:23.385944 ignition[819]: INFO : Ignition 2.14.0 Feb 12 22:04:23.385944 ignition[819]: INFO : Stage: mount Feb 12 22:04:23.386295 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:04:23.386295 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:04:23.387303 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:04:23.389071 ignition[819]: INFO : mount: mount passed Feb 12 22:04:23.389071 ignition[819]: INFO : Ignition finished successfully Feb 12 22:04:23.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.389715 systemd[1]: Finished ignition-mount.service. Feb 12 22:04:23.398093 systemd[1]: Finished sysroot-boot.service. Feb 12 22:04:23.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:23.809122 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:04:23.834715 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (828) Feb 12 22:04:23.834750 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:04:23.834764 kernel: BTRFS info (device sda6): using free space tree Feb 12 22:04:23.835411 kernel: BTRFS info (device sda6): has skinny extents Feb 12 22:04:23.838885 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 22:04:23.840427 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:04:23.840950 systemd[1]: Starting ignition-files.service... Feb 12 22:04:23.850259 ignition[848]: INFO : Ignition 2.14.0 Feb 12 22:04:23.850259 ignition[848]: INFO : Stage: files Feb 12 22:04:23.850583 ignition[848]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:04:23.850583 ignition[848]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:04:23.851622 ignition[848]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:04:23.853909 ignition[848]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:04:23.854360 ignition[848]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:04:23.854360 ignition[848]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:04:23.856374 ignition[848]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:04:23.856602 ignition[848]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:04:23.857434 unknown[848]: wrote ssh authorized keys file for user: core Feb 12 22:04:23.857883 ignition[848]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:04:23.858412 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:04:23.858412 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 22:04:23.889057 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 22:04:23.955073 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:04:23.955353 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 22:04:23.955353 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 22:04:24.432652 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 22:04:24.553473 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 22:04:24.553774 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 22:04:24.553774 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 22:04:24.553774 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:04:24.928089 systemd-networkd[733]: ens192: Gained IPv6LL Feb 12 22:04:25.002520 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 22:04:25.063602 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 22:04:25.063916 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 22:04:25.065505 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:04:25.065677 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:04:25.225328 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 22:04:25.428067 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 22:04:25.428398 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:04:25.428398 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:04:25.428398 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:04:25.491581 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 22:04:26.156950 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 22:04:26.157468 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:04:26.157468 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:04:26.157468 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 12 22:04:26.205528 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 22:04:26.389062 ignition[848]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:04:26.389410 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:04:26.390900 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:04:26.390900 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:04:26.398080 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:04:26.398080 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:04:26.401887 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 12 22:04:26.402127 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:04:26.405267 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1571231822" Feb 12 22:04:26.405484 ignition[848]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1571231822": device or resource busy Feb 12 22:04:26.405703 ignition[848]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1571231822", trying btrfs: device or resource busy Feb 12 22:04:26.405930 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1571231822" Feb 12 22:04:26.407457 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1571231822" Feb 12 22:04:26.407883 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (853) Feb 12 22:04:26.409141 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1571231822" Feb 12 22:04:26.409374 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1571231822" Feb 12 22:04:26.409579 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 12 22:04:26.411033 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 12 22:04:26.411227 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(14): [started] processing unit "vmtoolsd.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(14): [finished] processing unit "vmtoolsd.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 12 22:04:26.411227 ignition[848]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1b): [started] processing unit "coreos-metadata.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1b): op(1c): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1b): op(1c): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1b): [finished] processing unit "coreos-metadata.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1d): [started] setting preset to enabled for "vmtoolsd.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1d): [finished] setting preset to enabled for "vmtoolsd.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(21): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 22:04:26.412672 ignition[848]: INFO : files: op(21): op(22): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 22:04:26.412539 systemd[1]: mnt-oem1571231822.mount: Deactivated successfully. Feb 12 22:04:26.589303 ignition[848]: INFO : files: op(21): op(22): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 22:04:26.589587 ignition[848]: INFO : files: op(21): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 22:04:26.589587 ignition[848]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:04:26.589587 ignition[848]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:04:26.589587 ignition[848]: INFO : files: files passed Feb 12 22:04:26.589587 ignition[848]: INFO : Ignition finished successfully Feb 12 22:04:26.591164 systemd[1]: Finished ignition-files.service. Feb 12 22:04:26.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.592100 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:04:26.597231 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 12 22:04:26.597254 kernel: audit: type=1130 audit(1707775466.589:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.592263 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:04:26.592781 systemd[1]: Starting ignition-quench.service... Feb 12 22:04:26.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.600171 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:04:26.606977 kernel: audit: type=1130 audit(1707775466.598:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.606996 kernel: audit: type=1131 audit(1707775466.598:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.600235 systemd[1]: Finished ignition-quench.service. Feb 12 22:04:26.608069 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:04:26.611942 kernel: audit: type=1130 audit(1707775466.606:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.608366 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:04:26.608588 systemd[1]: Reached target ignition-complete.target. Feb 12 22:04:26.612508 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:04:26.621089 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:04:26.621142 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:04:26.621584 systemd[1]: Reached target initrd-fs.target. Feb 12 22:04:26.621795 systemd[1]: Reached target initrd.target. Feb 12 22:04:26.622191 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:04:26.622781 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:04:26.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.627887 kernel: audit: type=1130 audit(1707775466.619:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.627906 kernel: audit: type=1131 audit(1707775466.619:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.629000 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:04:26.629495 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:04:26.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.632887 kernel: audit: type=1130 audit(1707775466.627:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.635628 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:04:26.635790 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:04:26.635994 systemd[1]: Stopped target timers.target. Feb 12 22:04:26.636169 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:04:26.638810 kernel: audit: type=1131 audit(1707775466.634:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.636231 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:04:26.636431 systemd[1]: Stopped target initrd.target. Feb 12 22:04:26.638986 systemd[1]: Stopped target basic.target. Feb 12 22:04:26.639129 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:04:26.639307 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:04:26.639488 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:04:26.639675 systemd[1]: Stopped target remote-fs.target. Feb 12 22:04:26.639854 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:04:26.640050 systemd[1]: Stopped target sysinit.target. Feb 12 22:04:26.640222 systemd[1]: Stopped target local-fs.target. Feb 12 22:04:26.640397 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:04:26.640575 systemd[1]: Stopped target swap.target. Feb 12 22:04:26.643340 kernel: audit: type=1131 audit(1707775466.639:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.640736 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:04:26.640793 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:04:26.646022 kernel: audit: type=1131 audit(1707775466.641:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.640974 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:04:26.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.643424 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:04:26.643481 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:04:26.643665 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:04:26.643722 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:04:26.646165 systemd[1]: Stopped target paths.target. Feb 12 22:04:26.646291 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:04:26.647990 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:04:26.648195 systemd[1]: Stopped target slices.target. Feb 12 22:04:26.648434 systemd[1]: Stopped target sockets.target. Feb 12 22:04:26.648692 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:04:26.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.648783 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:04:26.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.649029 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:04:26.649103 systemd[1]: Stopped ignition-files.service. Feb 12 22:04:26.649860 systemd[1]: Stopping ignition-mount.service... Feb 12 22:04:26.650143 systemd[1]: Stopping iscsid.service... Feb 12 22:04:26.652943 iscsid[739]: iscsid shutting down. Feb 12 22:04:26.652690 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:04:26.652772 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:04:26.655635 ignition[887]: INFO : Ignition 2.14.0 Feb 12 22:04:26.655635 ignition[887]: INFO : Stage: umount Feb 12 22:04:26.656027 ignition[887]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:04:26.656027 ignition[887]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:04:26.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.656746 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:04:26.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.656883 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:04:26.662967 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:04:26.656973 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:04:26.658035 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:04:26.658100 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:04:26.659312 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:04:26.664832 ignition[887]: INFO : umount: umount passed Feb 12 22:04:26.664832 ignition[887]: INFO : Ignition finished successfully Feb 12 22:04:26.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.659366 systemd[1]: Stopped iscsid.service. Feb 12 22:04:26.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.659709 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:04:26.659760 systemd[1]: Closed iscsid.socket. Feb 12 22:04:26.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.659909 systemd[1]: Stopping iscsiuio.service... Feb 12 22:04:26.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.660094 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:04:26.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.660137 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:04:26.661486 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:04:26.661532 systemd[1]: Stopped iscsiuio.service. Feb 12 22:04:26.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.661667 systemd[1]: Stopped target network.target. Feb 12 22:04:26.661768 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:04:26.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.661787 systemd[1]: Closed iscsiuio.socket. Feb 12 22:04:26.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.661937 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:04:26.662102 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:04:26.664784 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:04:26.664825 systemd[1]: Stopped ignition-mount.service. Feb 12 22:04:26.665507 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:04:26.665547 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:04:26.665748 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:04:26.665764 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:04:26.666055 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:04:26.666076 systemd[1]: Stopped ignition-disks.service. Feb 12 22:04:26.666489 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:04:26.667000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:04:26.666507 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:04:26.666649 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:04:26.666667 systemd[1]: Stopped ignition-setup.service. Feb 12 22:04:26.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.667185 systemd[1]: Stopping network-cleanup.service... Feb 12 22:04:26.667342 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:04:26.667365 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:04:26.667545 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Feb 12 22:04:26.667564 systemd[1]: Stopped afterburn-network-kargs.service. Feb 12 22:04:26.667797 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:04:26.667819 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:04:26.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.669436 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:04:26.669458 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:04:26.671435 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:04:26.672324 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 22:04:26.672597 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:04:26.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.672644 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:04:26.673725 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:04:26.672000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:04:26.673787 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:04:26.674623 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:04:26.674646 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:04:26.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.676054 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:04:26.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.676072 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:04:26.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.676189 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:04:26.676210 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:04:26.676388 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:04:26.676407 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:04:26.676547 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:04:26.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.676566 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:04:26.677057 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:04:26.677239 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:04:26.677271 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:04:26.677606 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:04:26.677657 systemd[1]: Stopped network-cleanup.service. Feb 12 22:04:26.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.681067 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:04:26.681111 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:04:26.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.683270 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 22:04:26.688349 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:04:26.688398 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:04:26.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.688709 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:04:26.688816 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:04:26.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:26.688839 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:04:26.689363 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:04:26.696105 systemd[1]: Switching root. Feb 12 22:04:26.712013 systemd-journald[216]: Journal stopped Feb 12 22:04:29.991293 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Feb 12 22:04:29.991320 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:04:29.991329 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:04:29.991335 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:04:29.991341 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:04:29.991353 kernel: SELinux: policy capability open_perms=1 Feb 12 22:04:29.991360 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:04:29.991365 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:04:29.991370 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:04:29.991376 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:04:29.991381 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:04:29.991387 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:04:29.991398 systemd[1]: Successfully loaded SELinux policy in 39.512ms. Feb 12 22:04:29.991405 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.057ms. Feb 12 22:04:29.991413 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:04:29.991420 systemd[1]: Detected virtualization vmware. Feb 12 22:04:29.991430 systemd[1]: Detected architecture x86-64. Feb 12 22:04:29.991437 systemd[1]: Detected first boot. Feb 12 22:04:29.991444 systemd[1]: Initializing machine ID from random generator. Feb 12 22:04:29.991450 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:04:29.991456 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:04:29.991463 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:04:29.991470 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:04:29.991477 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:04:29.991489 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:04:29.991496 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:04:29.991502 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:04:29.991509 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:04:29.991515 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:04:29.991521 systemd[1]: Created slice system-getty.slice. Feb 12 22:04:29.991527 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:04:29.991538 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:04:29.991545 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:04:29.991551 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:04:29.991557 systemd[1]: Created slice user.slice. Feb 12 22:04:29.991563 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:04:29.991569 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:04:29.991575 systemd[1]: Set up automount boot.automount. Feb 12 22:04:29.991581 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:04:29.991594 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:04:29.991603 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:04:29.991616 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:04:29.991623 systemd[1]: Reached target integritysetup.target. Feb 12 22:04:29.991631 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:04:29.991637 systemd[1]: Reached target remote-fs.target. Feb 12 22:04:29.991644 systemd[1]: Reached target slices.target. Feb 12 22:04:29.991650 systemd[1]: Reached target swap.target. Feb 12 22:04:29.991656 systemd[1]: Reached target torcx.target. Feb 12 22:04:29.991668 systemd[1]: Reached target veritysetup.target. Feb 12 22:04:29.991675 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:04:29.991682 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:04:29.991688 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:04:29.991695 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:04:29.991702 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:04:29.991713 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:04:29.991737 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:04:29.991744 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:04:29.991751 systemd[1]: Mounting media.mount... Feb 12 22:04:29.991758 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:04:29.991779 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:04:29.991786 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:04:29.991797 systemd[1]: Mounting tmp.mount... Feb 12 22:04:29.991804 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:04:29.991810 systemd[1]: Starting ignition-delete-config.service... Feb 12 22:04:29.991818 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:04:29.991825 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:04:29.991831 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:04:29.991838 systemd[1]: Starting modprobe@drm.service... Feb 12 22:04:29.991844 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:04:29.991851 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:04:29.991864 systemd[1]: Starting modprobe@loop.service... Feb 12 22:04:29.991887 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:04:29.991895 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:04:29.991901 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:04:29.991908 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:04:29.991914 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:04:29.991921 systemd[1]: Stopped systemd-journald.service. Feb 12 22:04:29.991927 systemd[1]: Starting systemd-journald.service... Feb 12 22:04:29.991934 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:04:29.991948 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:04:29.991955 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:04:29.991962 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:04:29.991969 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:04:29.991975 systemd[1]: Stopped verity-setup.service. Feb 12 22:04:29.991982 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:04:29.991989 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:04:29.991996 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:04:29.992002 systemd[1]: Mounted media.mount. Feb 12 22:04:29.992014 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:04:29.992021 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:04:29.992028 systemd[1]: Mounted tmp.mount. Feb 12 22:04:29.992034 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:04:29.992041 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:04:29.992047 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:04:29.992054 kernel: fuse: init (API version 7.34) Feb 12 22:04:29.992060 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:04:29.992066 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:04:29.992078 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:04:29.992085 systemd[1]: Finished modprobe@drm.service. Feb 12 22:04:29.992091 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:04:29.992098 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:04:29.992104 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:04:29.992111 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:04:29.992118 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:04:29.992124 kernel: loop: module loaded Feb 12 22:04:29.992135 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:04:29.992144 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:04:29.992150 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:04:29.992157 systemd[1]: Finished modprobe@loop.service. Feb 12 22:04:29.992163 systemd[1]: Reached target network-pre.target. Feb 12 22:04:29.992170 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:04:29.992176 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:04:29.992183 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:04:29.992190 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:04:29.992202 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:04:29.992209 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:04:29.992216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:04:29.992222 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:04:29.992237 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:04:29.992249 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:04:29.992257 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:04:29.992263 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:04:29.992275 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:04:29.992283 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:04:29.992292 systemd-journald[999]: Journal started Feb 12 22:04:29.992326 systemd-journald[999]: Runtime Journal (/run/log/journal/3a24a838bd314d0791ccfaa29b591412) is 4.8M, max 38.8M, 34.0M free. Feb 12 22:04:26.858000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:04:26.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:04:26.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:04:26.943000 audit: BPF prog-id=10 op=LOAD Feb 12 22:04:26.943000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:04:26.943000 audit: BPF prog-id=11 op=LOAD Feb 12 22:04:26.943000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:04:27.103000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:04:27.103000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:27.103000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:04:27.105000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:04:27.105000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b5 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:27.105000 audit: CWD cwd="/" Feb 12 22:04:27.105000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:27.105000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:27.105000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:04:29.820000 audit: BPF prog-id=12 op=LOAD Feb 12 22:04:29.820000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:04:29.820000 audit: BPF prog-id=13 op=LOAD Feb 12 22:04:29.820000 audit: BPF prog-id=14 op=LOAD Feb 12 22:04:29.820000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:04:29.820000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:04:29.820000 audit: BPF prog-id=15 op=LOAD Feb 12 22:04:29.820000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:04:29.820000 audit: BPF prog-id=16 op=LOAD Feb 12 22:04:29.820000 audit: BPF prog-id=17 op=LOAD Feb 12 22:04:29.820000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:04:29.820000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:04:29.822000 audit: BPF prog-id=18 op=LOAD Feb 12 22:04:29.822000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:04:29.822000 audit: BPF prog-id=19 op=LOAD Feb 12 22:04:29.822000 audit: BPF prog-id=20 op=LOAD Feb 12 22:04:29.822000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:04:29.822000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:04:29.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.824000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:04:29.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.897000 audit: BPF prog-id=21 op=LOAD Feb 12 22:04:29.897000 audit: BPF prog-id=22 op=LOAD Feb 12 22:04:29.897000 audit: BPF prog-id=23 op=LOAD Feb 12 22:04:29.897000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:04:29.897000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:04:29.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:29.987000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:04:29.987000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcec233e10 a2=4000 a3=7ffcec233eac items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.987000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:04:29.820906 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:04:27.102389 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:04:29.824415 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:04:27.102916 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:04:27.102935 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:04:29.994349 systemd[1]: Started systemd-journald.service. Feb 12 22:04:29.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:27.102965 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:04:29.994013 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:04:27.102973 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:04:27.102992 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:04:27.102999 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:04:27.103122 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:04:29.994774 jq[986]: true Feb 12 22:04:27.103145 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:04:27.103153 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:04:27.103644 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:04:27.103671 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:04:27.103683 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:04:27.103694 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:04:27.103709 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:04:27.103723 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:04:29.490889 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:04:29.491048 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:04:29.491116 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:04:29.491223 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:04:29.995849 jq[1004]: true Feb 12 22:04:29.491255 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:04:29.491296 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-02-12T22:04:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:04:30.019915 systemd-journald[999]: Time spent on flushing to /var/log/journal/3a24a838bd314d0791ccfaa29b591412 is 26.250ms for 2052 entries. Feb 12 22:04:30.019915 systemd-journald[999]: System Journal (/var/log/journal/3a24a838bd314d0791ccfaa29b591412) is 8.0M, max 584.8M, 576.8M free. Feb 12 22:04:30.090889 systemd-journald[999]: Received client request to flush runtime journal. Feb 12 22:04:30.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.053781 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:04:30.091098 udevadm[1044]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 22:04:30.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.060058 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:04:30.061004 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:04:30.091390 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:04:30.166889 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:04:30.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.280761 ignition[1023]: Ignition 2.14.0 Feb 12 22:04:30.280977 ignition[1023]: deleting config from guestinfo properties Feb 12 22:04:30.284980 ignition[1023]: Successfully deleted config Feb 12 22:04:30.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.285516 systemd[1]: Finished ignition-delete-config.service. Feb 12 22:04:30.494070 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:04:30.495433 systemd[1]: Starting systemd-udevd.service... Feb 12 22:04:30.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.493000 audit: BPF prog-id=24 op=LOAD Feb 12 22:04:30.493000 audit: BPF prog-id=25 op=LOAD Feb 12 22:04:30.493000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:04:30.493000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:04:30.509907 systemd-udevd[1050]: Using default interface naming scheme 'v252'. Feb 12 22:04:30.532813 systemd[1]: Started systemd-udevd.service. Feb 12 22:04:30.534697 systemd[1]: Starting systemd-networkd.service... Feb 12 22:04:30.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.532000 audit: BPF prog-id=26 op=LOAD Feb 12 22:04:30.548229 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:04:30.545000 audit: BPF prog-id=27 op=LOAD Feb 12 22:04:30.545000 audit: BPF prog-id=28 op=LOAD Feb 12 22:04:30.545000 audit: BPF prog-id=29 op=LOAD Feb 12 22:04:30.570009 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 22:04:30.586122 systemd[1]: Started systemd-userdbd.service. Feb 12 22:04:30.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.596881 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 22:04:30.611882 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:04:30.670728 systemd-networkd[1062]: lo: Link UP Feb 12 22:04:30.670732 systemd-networkd[1062]: lo: Gained carrier Feb 12 22:04:30.671040 systemd-networkd[1062]: Enumeration completed Feb 12 22:04:30.671092 systemd[1]: Started systemd-networkd.service. Feb 12 22:04:30.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.671309 systemd-networkd[1062]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Feb 12 22:04:30.674421 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 12 22:04:30.674578 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 12 22:04:30.674657 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Feb 12 22:04:30.675895 systemd-networkd[1062]: ens192: Link UP Feb 12 22:04:30.675994 systemd-networkd[1062]: ens192: Gained carrier Feb 12 22:04:30.684516 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Feb 12 22:04:30.684666 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Feb 12 22:04:30.677000 audit[1060]: AVC avc: denied { confidentiality } for pid=1060 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:04:30.677000 audit[1060]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560795a13db0 a1=32194 a2=7fa11438cbc5 a3=5 items=108 ppid=1050 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:30.677000 audit: CWD cwd="/" Feb 12 22:04:30.677000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=1 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=2 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=3 name=(null) inode=24605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=4 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=5 name=(null) inode=24606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=6 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=7 name=(null) inode=24607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=8 name=(null) inode=24607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=9 name=(null) inode=24608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=10 name=(null) inode=24607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=11 name=(null) inode=24609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=12 name=(null) inode=24607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=13 name=(null) inode=24610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=14 name=(null) inode=24607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=15 name=(null) inode=24611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=16 name=(null) inode=24607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=17 name=(null) inode=24612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=18 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=19 name=(null) inode=24613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=20 name=(null) inode=24613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=21 name=(null) inode=24614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=22 name=(null) inode=24613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=23 name=(null) inode=24615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=24 name=(null) inode=24613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=25 name=(null) inode=24616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=26 name=(null) inode=24613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=27 name=(null) inode=24617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=28 name=(null) inode=24613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=29 name=(null) inode=24618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=30 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=31 name=(null) inode=24619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=32 name=(null) inode=24619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=33 name=(null) inode=24620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=34 name=(null) inode=24619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=35 name=(null) inode=24621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=36 name=(null) inode=24619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=37 name=(null) inode=24622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=38 name=(null) inode=24619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=39 name=(null) inode=24623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=40 name=(null) inode=24619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=41 name=(null) inode=24624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=42 name=(null) inode=24604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=43 name=(null) inode=24625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=44 name=(null) inode=24625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=45 name=(null) inode=24626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=46 name=(null) inode=24625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=47 name=(null) inode=24627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=48 name=(null) inode=24625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=49 name=(null) inode=24628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=50 name=(null) inode=24625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=51 name=(null) inode=24629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=52 name=(null) inode=24625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=53 name=(null) inode=24630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=55 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=56 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=57 name=(null) inode=24632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=58 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=59 name=(null) inode=24633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=60 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=61 name=(null) inode=24634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=62 name=(null) inode=24634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=63 name=(null) inode=24635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=64 name=(null) inode=24634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=65 name=(null) inode=24636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=66 name=(null) inode=24634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=67 name=(null) inode=24637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=68 name=(null) inode=24634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=69 name=(null) inode=24638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=70 name=(null) inode=24634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=71 name=(null) inode=24639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=72 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=73 name=(null) inode=24640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=74 name=(null) inode=24640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=75 name=(null) inode=24641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=76 name=(null) inode=24640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=77 name=(null) inode=24642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=78 name=(null) inode=24640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=79 name=(null) inode=24643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=80 name=(null) inode=24640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=81 name=(null) inode=24644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=82 name=(null) inode=24640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=83 name=(null) inode=24645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=84 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=85 name=(null) inode=24646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=86 name=(null) inode=24646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=87 name=(null) inode=24647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=88 name=(null) inode=24646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=89 name=(null) inode=24648 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=90 name=(null) inode=24646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=91 name=(null) inode=24649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=92 name=(null) inode=24646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=93 name=(null) inode=24650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=94 name=(null) inode=24646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=95 name=(null) inode=24651 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=96 name=(null) inode=24631 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=97 name=(null) inode=24652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=98 name=(null) inode=24652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=99 name=(null) inode=24653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=100 name=(null) inode=24652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=101 name=(null) inode=24654 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=102 name=(null) inode=24652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=103 name=(null) inode=24655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=104 name=(null) inode=24652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=105 name=(null) inode=24656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=106 name=(null) inode=24652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PATH item=107 name=(null) inode=24657 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:30.677000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:04:30.696879 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Feb 12 22:04:30.698878 kernel: Guest personality initialized and is active Feb 12 22:04:30.698918 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1056) Feb 12 22:04:30.707224 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Feb 12 22:04:30.707280 kernel: Initialized host personality Feb 12 22:04:30.712436 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:04:30.728899 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 22:04:30.738283 (udev-worker)[1057]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Feb 12 22:04:30.744878 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:04:30.765154 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:04:30.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.766310 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:04:30.805442 lvm[1083]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:04:30.827515 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:04:30.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.827710 systemd[1]: Reached target cryptsetup.target. Feb 12 22:04:30.828707 systemd[1]: Starting lvm2-activation.service... Feb 12 22:04:30.830957 lvm[1084]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:04:30.848377 systemd[1]: Finished lvm2-activation.service. Feb 12 22:04:30.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.848566 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:04:30.848670 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:04:30.848688 systemd[1]: Reached target local-fs.target. Feb 12 22:04:30.848780 systemd[1]: Reached target machines.target. Feb 12 22:04:30.849724 systemd[1]: Starting ldconfig.service... Feb 12 22:04:30.857231 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:04:30.857255 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:04:30.857976 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:04:30.858707 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:04:30.859474 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:04:30.859630 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:04:30.859654 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:04:30.860773 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:04:30.879046 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1086 (bootctl) Feb 12 22:04:30.879756 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:04:30.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:30.884381 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:04:31.018882 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:04:31.117827 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:04:31.211702 systemd-tmpfiles[1089]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:04:31.779952 systemd-fsck[1094]: fsck.fat 4.2 (2021-01-31) Feb 12 22:04:31.779952 systemd-fsck[1094]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 22:04:31.780976 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:04:31.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:31.782033 systemd[1]: Mounting boot.mount... Feb 12 22:04:31.784726 kernel: kauditd_printk_skb: 235 callbacks suppressed Feb 12 22:04:31.784763 kernel: audit: type=1130 audit(1707775471.779:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:31.940521 systemd[1]: Mounted boot.mount. Feb 12 22:04:31.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:31.953409 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:04:31.953833 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:04:31.957924 kernel: audit: type=1130 audit(1707775471.952:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:31.963955 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:04:31.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:31.966988 kernel: audit: type=1130 audit(1707775471.962:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.048733 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:04:32.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.050110 systemd[1]: Starting audit-rules.service... Feb 12 22:04:32.054737 kernel: audit: type=1130 audit(1707775472.047:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.053157 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:04:32.054016 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:04:32.056775 kernel: audit: type=1334 audit(1707775472.052:164): prog-id=30 op=LOAD Feb 12 22:04:32.052000 audit: BPF prog-id=30 op=LOAD Feb 12 22:04:32.056060 systemd[1]: Starting systemd-resolved.service... Feb 12 22:04:32.060911 kernel: audit: type=1334 audit(1707775472.055:165): prog-id=31 op=LOAD Feb 12 22:04:32.055000 audit: BPF prog-id=31 op=LOAD Feb 12 22:04:32.058155 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:04:32.059370 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:04:32.065866 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:04:32.071665 kernel: audit: type=1130 audit(1707775472.064:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.071711 kernel: audit: type=1127 audit(1707775472.065:167): pid=1103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.071730 kernel: audit: type=1130 audit(1707775472.066:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.065000 audit[1103]: SYSTEM_BOOT pid=1103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.066048 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:04:32.068581 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:04:32.123516 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:04:32.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.123748 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:04:32.123865 systemd[1]: Reached target time-set.target. Feb 12 22:04:32.124883 kernel: audit: type=1130 audit(1707775472.121:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:04:32.133998 systemd-resolved[1101]: Positive Trust Anchors: Feb 12 22:04:32.134174 systemd-resolved[1101]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:04:32.134252 systemd-resolved[1101]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:04:32.148000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:04:32.148000 audit[1118]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd420557a0 a2=420 a3=0 items=0 ppid=1097 pid=1118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:32.148000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:04:32.150447 augenrules[1118]: No rules Feb 12 22:04:32.150849 systemd[1]: Finished audit-rules.service. Feb 12 22:04:32.163665 systemd-resolved[1101]: Defaulting to hostname 'linux'. Feb 12 22:04:32.164815 systemd[1]: Started systemd-resolved.service. Feb 12 22:04:32.164968 systemd[1]: Reached target network.target. Feb 12 22:04:32.165060 systemd[1]: Reached target nss-lookup.target. Feb 12 22:05:17.151792 systemd-resolved[1101]: Clock change detected. Flushing caches. Feb 12 22:05:17.151864 systemd-timesyncd[1102]: Contacted time server 174.136.99.2:123 (0.flatcar.pool.ntp.org). Feb 12 22:05:17.151930 systemd-timesyncd[1102]: Initial clock synchronization to Mon 2024-02-12 22:05:17.151723 UTC. Feb 12 22:05:17.228340 systemd-networkd[1062]: ens192: Gained IPv6LL Feb 12 22:05:17.335744 ldconfig[1085]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:05:17.350597 systemd[1]: Finished ldconfig.service. Feb 12 22:05:17.351776 systemd[1]: Starting systemd-update-done.service... Feb 12 22:05:17.356019 systemd[1]: Finished systemd-update-done.service. Feb 12 22:05:17.356203 systemd[1]: Reached target sysinit.target. Feb 12 22:05:17.356354 systemd[1]: Started motdgen.path. Feb 12 22:05:17.356454 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:05:17.356650 systemd[1]: Started logrotate.timer. Feb 12 22:05:17.356801 systemd[1]: Started mdadm.timer. Feb 12 22:05:17.356885 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:05:17.356975 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:05:17.356994 systemd[1]: Reached target paths.target. Feb 12 22:05:17.357076 systemd[1]: Reached target timers.target. Feb 12 22:05:17.357315 systemd[1]: Listening on dbus.socket. Feb 12 22:05:17.358056 systemd[1]: Starting docker.socket... Feb 12 22:05:17.366435 systemd[1]: Listening on sshd.socket. Feb 12 22:05:17.366586 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:05:17.366815 systemd[1]: Listening on docker.socket. Feb 12 22:05:17.366937 systemd[1]: Reached target sockets.target. Feb 12 22:05:17.367024 systemd[1]: Reached target basic.target. Feb 12 22:05:17.367138 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:05:17.367156 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:05:17.367784 systemd[1]: Starting containerd.service... Feb 12 22:05:17.368635 systemd[1]: Starting dbus.service... Feb 12 22:05:17.369820 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:05:17.370638 systemd[1]: Starting extend-filesystems.service... Feb 12 22:05:17.371200 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:05:17.371510 jq[1128]: false Feb 12 22:05:17.371966 systemd[1]: Starting motdgen.service... Feb 12 22:05:17.372853 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:05:17.373751 systemd[1]: Starting prepare-critools.service... Feb 12 22:05:17.375515 systemd[1]: Starting prepare-helm.service... Feb 12 22:05:17.376253 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:05:17.376973 systemd[1]: Starting sshd-keygen.service... Feb 12 22:05:17.378574 systemd[1]: Starting systemd-logind.service... Feb 12 22:05:17.378686 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:05:17.378715 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 22:05:17.379060 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:05:17.379443 systemd[1]: Starting update-engine.service... Feb 12 22:05:17.380198 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:05:17.381128 systemd[1]: Starting vmtoolsd.service... Feb 12 22:05:17.382025 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:05:17.382416 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:05:17.388524 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:05:17.388668 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:05:17.392020 jq[1140]: true Feb 12 22:05:17.397281 systemd[1]: Started vmtoolsd.service. Feb 12 22:05:17.401453 jq[1151]: true Feb 12 22:05:17.407357 tar[1143]: ./ Feb 12 22:05:17.407357 tar[1143]: ./loopback Feb 12 22:05:17.408322 tar[1145]: linux-amd64/helm Feb 12 22:05:17.414362 tar[1144]: crictl Feb 12 22:05:17.434560 extend-filesystems[1129]: Found sda Feb 12 22:05:17.437315 extend-filesystems[1129]: Found sda1 Feb 12 22:05:17.437514 extend-filesystems[1129]: Found sda2 Feb 12 22:05:17.437763 extend-filesystems[1129]: Found sda3 Feb 12 22:05:17.439343 dbus-daemon[1127]: [system] SELinux support is enabled Feb 12 22:05:17.439447 systemd[1]: Started dbus.service. Feb 12 22:05:17.440430 extend-filesystems[1129]: Found usr Feb 12 22:05:17.440763 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:05:17.440781 systemd[1]: Reached target system-config.target. Feb 12 22:05:17.440902 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:05:17.440917 systemd[1]: Reached target user-config.target. Feb 12 22:05:17.441530 extend-filesystems[1129]: Found sda4 Feb 12 22:05:17.442212 extend-filesystems[1129]: Found sda6 Feb 12 22:05:17.443094 extend-filesystems[1129]: Found sda7 Feb 12 22:05:17.444216 extend-filesystems[1129]: Found sda9 Feb 12 22:05:17.444361 extend-filesystems[1129]: Checking size of /dev/sda9 Feb 12 22:05:17.448013 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:05:17.448113 systemd[1]: Finished motdgen.service. Feb 12 22:05:17.483009 extend-filesystems[1129]: Old size kept for /dev/sda9 Feb 12 22:05:17.483009 extend-filesystems[1129]: Found sr0 Feb 12 22:05:17.487368 kernel: NET: Registered PF_VSOCK protocol family Feb 12 22:05:17.480979 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:05:17.481099 systemd[1]: Finished extend-filesystems.service. Feb 12 22:05:17.491948 bash[1180]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:05:17.493245 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:05:17.506905 update_engine[1139]: I0212 22:05:17.506364 1139 main.cc:92] Flatcar Update Engine starting Feb 12 22:05:17.508565 update_engine[1139]: I0212 22:05:17.508549 1139 update_check_scheduler.cc:74] Next update check in 6m29s Feb 12 22:05:17.509085 env[1153]: time="2024-02-12T22:05:17.509033041Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:05:17.509293 systemd[1]: Started update-engine.service. Feb 12 22:05:17.510612 systemd[1]: Started locksmithd.service. Feb 12 22:05:17.526765 tar[1143]: ./bandwidth Feb 12 22:05:17.536983 systemd-logind[1138]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 22:05:17.537155 systemd-logind[1138]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 22:05:17.537296 systemd-logind[1138]: New seat seat0. Feb 12 22:05:17.538101 systemd[1]: Started systemd-logind.service. Feb 12 22:05:17.551905 env[1153]: time="2024-02-12T22:05:17.551881327Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:05:17.551978 env[1153]: time="2024-02-12T22:05:17.551965283Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554652 env[1153]: time="2024-02-12T22:05:17.554633779Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554652 env[1153]: time="2024-02-12T22:05:17.554650634Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554776 env[1153]: time="2024-02-12T22:05:17.554761263Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554776 env[1153]: time="2024-02-12T22:05:17.554773460Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554825 env[1153]: time="2024-02-12T22:05:17.554781356Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:05:17.554825 env[1153]: time="2024-02-12T22:05:17.554786763Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554857 env[1153]: time="2024-02-12T22:05:17.554828015Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:05:17.554954 env[1153]: time="2024-02-12T22:05:17.554942755Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:05:17.555050 env[1153]: time="2024-02-12T22:05:17.555035688Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:05:17.555050 env[1153]: time="2024-02-12T22:05:17.555048190Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:05:17.555096 env[1153]: time="2024-02-12T22:05:17.555076245Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:05:17.555096 env[1153]: time="2024-02-12T22:05:17.555083977Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:05:17.574663 tar[1143]: ./ptp Feb 12 22:05:17.575268 env[1153]: time="2024-02-12T22:05:17.575249749Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:05:17.575302 env[1153]: time="2024-02-12T22:05:17.575274052Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:05:17.575302 env[1153]: time="2024-02-12T22:05:17.575284303Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:05:17.575351 env[1153]: time="2024-02-12T22:05:17.575338279Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575382 env[1153]: time="2024-02-12T22:05:17.575350600Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575382 env[1153]: time="2024-02-12T22:05:17.575358822Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575382 env[1153]: time="2024-02-12T22:05:17.575367143Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575382 env[1153]: time="2024-02-12T22:05:17.575375230Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575445 env[1153]: time="2024-02-12T22:05:17.575393231Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575445 env[1153]: time="2024-02-12T22:05:17.575404107Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575445 env[1153]: time="2024-02-12T22:05:17.575411961Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575445 env[1153]: time="2024-02-12T22:05:17.575419106Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:05:17.575504 env[1153]: time="2024-02-12T22:05:17.575486137Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:05:17.575558 env[1153]: time="2024-02-12T22:05:17.575545397Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:05:17.575715 env[1153]: time="2024-02-12T22:05:17.575703560Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:05:17.575741 env[1153]: time="2024-02-12T22:05:17.575721986Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575741 env[1153]: time="2024-02-12T22:05:17.575730570Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:05:17.575777 env[1153]: time="2024-02-12T22:05:17.575758601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575777 env[1153]: time="2024-02-12T22:05:17.575775351Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575807 env[1153]: time="2024-02-12T22:05:17.575782532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575807 env[1153]: time="2024-02-12T22:05:17.575791556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575807 env[1153]: time="2024-02-12T22:05:17.575798502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575807 env[1153]: time="2024-02-12T22:05:17.575805405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575868 env[1153]: time="2024-02-12T22:05:17.575812004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575868 env[1153]: time="2024-02-12T22:05:17.575817750Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575868 env[1153]: time="2024-02-12T22:05:17.575826002Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:05:17.575918 env[1153]: time="2024-02-12T22:05:17.575899100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575918 env[1153]: time="2024-02-12T22:05:17.575908215Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575951 env[1153]: time="2024-02-12T22:05:17.575923943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.575951 env[1153]: time="2024-02-12T22:05:17.575935133Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:05:17.575951 env[1153]: time="2024-02-12T22:05:17.575944549Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:05:17.576001 env[1153]: time="2024-02-12T22:05:17.575950927Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:05:17.576001 env[1153]: time="2024-02-12T22:05:17.575961731Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:05:17.576001 env[1153]: time="2024-02-12T22:05:17.575983056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:05:17.576140 env[1153]: time="2024-02-12T22:05:17.576109440Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.576152425Z" level=info msg="Connect containerd service" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.576200210Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.576550191Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.576692040Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.576715602Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577070011Z" level=info msg="Start subscribing containerd event" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577097965Z" level=info msg="Start recovering state" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577128531Z" level=info msg="Start event monitor" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577135506Z" level=info msg="Start snapshots syncer" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577140325Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577144751Z" level=info msg="Start streaming server" Feb 12 22:05:17.578390 env[1153]: time="2024-02-12T22:05:17.577220167Z" level=info msg="containerd successfully booted in 0.069940s" Feb 12 22:05:17.576780 systemd[1]: Started containerd.service. Feb 12 22:05:17.617645 tar[1143]: ./vlan Feb 12 22:05:17.646025 tar[1143]: ./host-device Feb 12 22:05:17.673320 tar[1143]: ./tuning Feb 12 22:05:17.696663 tar[1143]: ./vrf Feb 12 22:05:17.721068 tar[1143]: ./sbr Feb 12 22:05:17.744649 tar[1143]: ./tap Feb 12 22:05:17.773121 tar[1143]: ./dhcp Feb 12 22:05:17.840972 tar[1143]: ./static Feb 12 22:05:17.859899 tar[1143]: ./firewall Feb 12 22:05:17.889047 tar[1143]: ./macvlan Feb 12 22:05:17.915957 tar[1143]: ./dummy Feb 12 22:05:17.942500 tar[1143]: ./bridge Feb 12 22:05:17.971985 tar[1143]: ./ipvlan Feb 12 22:05:17.998718 tar[1143]: ./portmap Feb 12 22:05:18.025154 tar[1143]: ./host-local Feb 12 22:05:18.090215 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:05:18.206475 tar[1145]: linux-amd64/LICENSE Feb 12 22:05:18.206548 tar[1145]: linux-amd64/README.md Feb 12 22:05:18.209282 systemd[1]: Finished prepare-helm.service. Feb 12 22:05:18.231915 systemd[1]: Finished prepare-critools.service. Feb 12 22:05:18.512246 locksmithd[1191]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:05:18.985562 sshd_keygen[1152]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:05:18.998056 systemd[1]: Finished sshd-keygen.service. Feb 12 22:05:18.999350 systemd[1]: Starting issuegen.service... Feb 12 22:05:19.002823 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:05:19.002919 systemd[1]: Finished issuegen.service. Feb 12 22:05:19.004026 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:05:19.013665 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:05:19.014647 systemd[1]: Started getty@tty1.service. Feb 12 22:05:19.015449 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 22:05:19.015645 systemd[1]: Reached target getty.target. Feb 12 22:05:19.015783 systemd[1]: Reached target multi-user.target. Feb 12 22:05:19.016753 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:05:19.021366 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:05:19.021464 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:05:19.021641 systemd[1]: Startup finished in 930ms (kernel) + 6.244s (initrd) + 7.290s (userspace) = 14.465s. Feb 12 22:05:19.238967 login[1265]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 22:05:19.245661 login[1264]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 22:05:19.266944 systemd[1]: Created slice user-500.slice. Feb 12 22:05:19.267748 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:05:19.271021 systemd-logind[1138]: New session 2 of user core. Feb 12 22:05:19.274081 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:05:19.275076 systemd[1]: Starting user@500.service... Feb 12 22:05:19.277299 (systemd)[1268]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:19.322082 systemd[1268]: Queued start job for default target default.target. Feb 12 22:05:19.322547 systemd[1268]: Reached target paths.target. Feb 12 22:05:19.322571 systemd[1268]: Reached target sockets.target. Feb 12 22:05:19.322586 systemd[1268]: Reached target timers.target. Feb 12 22:05:19.322599 systemd[1268]: Reached target basic.target. Feb 12 22:05:19.322634 systemd[1268]: Reached target default.target. Feb 12 22:05:19.322657 systemd[1268]: Startup finished in 41ms. Feb 12 22:05:19.322669 systemd[1]: Started user@500.service. Feb 12 22:05:19.323459 systemd[1]: Started session-2.scope. Feb 12 22:05:20.240442 login[1265]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 22:05:20.243197 systemd-logind[1138]: New session 1 of user core. Feb 12 22:05:20.243678 systemd[1]: Started session-1.scope. Feb 12 22:05:57.549429 systemd[1]: Created slice system-sshd.slice. Feb 12 22:05:57.550269 systemd[1]: Started sshd@0-139.178.70.105:22-139.178.89.65:41602.service. Feb 12 22:05:57.623207 sshd[1289]: Accepted publickey for core from 139.178.89.65 port 41602 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:57.624228 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:57.627186 systemd[1]: Started session-3.scope. Feb 12 22:05:57.627513 systemd-logind[1138]: New session 3 of user core. Feb 12 22:05:57.675166 systemd[1]: Started sshd@1-139.178.70.105:22-139.178.89.65:41612.service. Feb 12 22:05:57.724590 sshd[1294]: Accepted publickey for core from 139.178.89.65 port 41612 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:57.725511 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:57.727955 systemd-logind[1138]: New session 4 of user core. Feb 12 22:05:57.728371 systemd[1]: Started session-4.scope. Feb 12 22:05:57.779247 sshd[1294]: pam_unix(sshd:session): session closed for user core Feb 12 22:05:57.780202 systemd[1]: Started sshd@2-139.178.70.105:22-139.178.89.65:41616.service. Feb 12 22:05:57.781450 systemd[1]: sshd@1-139.178.70.105:22-139.178.89.65:41612.service: Deactivated successfully. Feb 12 22:05:57.781875 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:05:57.783287 systemd-logind[1138]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:05:57.783914 systemd-logind[1138]: Removed session 4. Feb 12 22:05:57.819871 sshd[1299]: Accepted publickey for core from 139.178.89.65 port 41616 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:57.820788 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:57.823884 systemd[1]: Started session-5.scope. Feb 12 22:05:57.824834 systemd-logind[1138]: New session 5 of user core. Feb 12 22:05:57.871843 sshd[1299]: pam_unix(sshd:session): session closed for user core Feb 12 22:05:57.874662 systemd[1]: sshd@2-139.178.70.105:22-139.178.89.65:41616.service: Deactivated successfully. Feb 12 22:05:57.875064 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:05:57.875446 systemd-logind[1138]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:05:57.876115 systemd[1]: Started sshd@3-139.178.70.105:22-139.178.89.65:41622.service. Feb 12 22:05:57.876620 systemd-logind[1138]: Removed session 5. Feb 12 22:05:57.914686 sshd[1306]: Accepted publickey for core from 139.178.89.65 port 41622 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:57.915448 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:57.918464 systemd[1]: Started session-6.scope. Feb 12 22:05:57.918683 systemd-logind[1138]: New session 6 of user core. Feb 12 22:05:57.968139 sshd[1306]: pam_unix(sshd:session): session closed for user core Feb 12 22:05:57.970181 systemd[1]: sshd@3-139.178.70.105:22-139.178.89.65:41622.service: Deactivated successfully. Feb 12 22:05:57.970540 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:05:57.970887 systemd-logind[1138]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:05:57.971526 systemd[1]: Started sshd@4-139.178.70.105:22-139.178.89.65:41632.service. Feb 12 22:05:57.972122 systemd-logind[1138]: Removed session 6. Feb 12 22:05:58.010122 sshd[1312]: Accepted publickey for core from 139.178.89.65 port 41632 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:58.011014 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:58.014137 systemd-logind[1138]: New session 7 of user core. Feb 12 22:05:58.014682 systemd[1]: Started session-7.scope. Feb 12 22:05:58.118877 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:05:58.119037 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:05:58.126288 dbus-daemon[1127]: \xd0\xddɭdU: received setenforce notice (enforcing=-1776969072) Feb 12 22:05:58.127648 sudo[1315]: pam_unix(sudo:session): session closed for user root Feb 12 22:05:58.130196 sshd[1312]: pam_unix(sshd:session): session closed for user core Feb 12 22:05:58.132110 systemd[1]: Started sshd@5-139.178.70.105:22-139.178.89.65:44974.service. Feb 12 22:05:58.133411 systemd[1]: sshd@4-139.178.70.105:22-139.178.89.65:41632.service: Deactivated successfully. Feb 12 22:05:58.133971 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:05:58.135509 systemd-logind[1138]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:05:58.136082 systemd-logind[1138]: Removed session 7. Feb 12 22:05:58.174410 sshd[1318]: Accepted publickey for core from 139.178.89.65 port 44974 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:58.175410 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:58.178389 systemd[1]: Started session-8.scope. Feb 12 22:05:58.178743 systemd-logind[1138]: New session 8 of user core. Feb 12 22:05:58.227345 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:05:58.227652 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:05:58.229299 sudo[1323]: pam_unix(sudo:session): session closed for user root Feb 12 22:05:58.231900 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:05:58.232010 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:05:58.237197 systemd[1]: Stopping audit-rules.service... Feb 12 22:05:58.236000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:05:58.238740 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:05:58.238769 kernel: audit: type=1305 audit(1707775558.236:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:05:58.240242 auditctl[1326]: No rules Feb 12 22:05:58.240519 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:05:58.240614 systemd[1]: Stopped audit-rules.service. Feb 12 22:05:58.241580 systemd[1]: Starting audit-rules.service... Feb 12 22:05:58.236000 audit[1326]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff062bfb80 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.236000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:05:58.246887 kernel: audit: type=1300 audit(1707775558.236:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff062bfb80 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.246917 kernel: audit: type=1327 audit(1707775558.236:172): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:05:58.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.253184 kernel: audit: type=1131 audit(1707775558.239:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.257069 augenrules[1343]: No rules Feb 12 22:05:58.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.257500 systemd[1]: Finished audit-rules.service. Feb 12 22:05:58.260184 kernel: audit: type=1130 audit(1707775558.256:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.260232 sudo[1322]: pam_unix(sudo:session): session closed for user root Feb 12 22:05:58.259000 audit[1322]: USER_END pid=1322 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.259000 audit[1322]: CRED_DISP pid=1322 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.263700 sshd[1318]: pam_unix(sshd:session): session closed for user core Feb 12 22:05:58.266363 kernel: audit: type=1106 audit(1707775558.259:175): pid=1322 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.266663 kernel: audit: type=1104 audit(1707775558.259:176): pid=1322 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.266683 kernel: audit: type=1130 audit(1707775558.265:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.266465 systemd[1]: Started sshd@6-139.178.70.105:22-139.178.89.65:44984.service. Feb 12 22:05:58.270769 kernel: audit: type=1106 audit(1707775558.268:178): pid=1318 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.268000 audit[1318]: USER_END pid=1318 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.270277 systemd[1]: sshd@5-139.178.70.105:22-139.178.89.65:44974.service: Deactivated successfully. Feb 12 22:05:58.270615 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 22:05:58.273821 systemd-logind[1138]: Session 8 logged out. Waiting for processes to exit. Feb 12 22:05:58.268000 audit[1318]: CRED_DISP pid=1318 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.276835 kernel: audit: type=1104 audit(1707775558.268:179): pid=1318 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.105:22-139.178.89.65:44974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.277046 systemd-logind[1138]: Removed session 8. Feb 12 22:05:58.306443 sshd[1348]: Accepted publickey for core from 139.178.89.65 port 44984 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:05:58.305000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.307114 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:05:58.305000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.305000 audit[1348]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ca634f0 a2=3 a3=0 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:05:58.309809 systemd[1]: Started session-9.scope. Feb 12 22:05:58.310138 systemd-logind[1138]: New session 9 of user core. Feb 12 22:05:58.311000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.312000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:05:58.359155 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:05:58.359331 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:05:58.357000 audit[1352]: USER_ACCT pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.358000 audit[1352]: CRED_REFR pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.359000 audit[1352]: USER_START pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.868027 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:05:58.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:58.878533 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:05:58.878710 systemd[1]: Reached target network-online.target. Feb 12 22:05:58.879612 systemd[1]: Starting docker.service... Feb 12 22:05:58.914535 env[1368]: time="2024-02-12T22:05:58.914499940Z" level=info msg="Starting up" Feb 12 22:05:58.915301 env[1368]: time="2024-02-12T22:05:58.915289971Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:05:58.915348 env[1368]: time="2024-02-12T22:05:58.915338974Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:05:58.915396 env[1368]: time="2024-02-12T22:05:58.915385426Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:05:58.915441 env[1368]: time="2024-02-12T22:05:58.915431697Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:05:58.916446 env[1368]: time="2024-02-12T22:05:58.916435852Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:05:58.916498 env[1368]: time="2024-02-12T22:05:58.916488603Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:05:58.916544 env[1368]: time="2024-02-12T22:05:58.916534525Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:05:58.916584 env[1368]: time="2024-02-12T22:05:58.916575808Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:05:58.923584 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4124797310-merged.mount: Deactivated successfully. Feb 12 22:05:58.955463 env[1368]: time="2024-02-12T22:05:58.955438199Z" level=info msg="Loading containers: start." Feb 12 22:05:58.985000 audit[1398]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:58.985000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff247eb410 a2=0 a3=7fff247eb3fc items=0 ppid=1368 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.985000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 22:05:58.986000 audit[1400]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:58.986000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd1df18370 a2=0 a3=7ffd1df1835c items=0 ppid=1368 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 22:05:58.987000 audit[1402]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:58.987000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffffd28020 a2=0 a3=7fffffd2800c items=0 ppid=1368 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:05:58.989000 audit[1404]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:58.989000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff1bb07550 a2=0 a3=7fff1bb0753c items=0 ppid=1368 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:05:58.990000 audit[1406]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:58.990000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc01a64dc0 a2=0 a3=7ffc01a64dac items=0 ppid=1368 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:58.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 22:05:59.001000 audit[1411]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.001000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffbb538c80 a2=0 a3=7fffbb538c6c items=0 ppid=1368 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 22:05:59.004000 audit[1413]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.004000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe5d808860 a2=0 a3=7ffe5d80884c items=0 ppid=1368 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 22:05:59.005000 audit[1415]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.005000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff371e6d70 a2=0 a3=7fff371e6d5c items=0 ppid=1368 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 22:05:59.006000 audit[1417]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.006000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcd913e2a0 a2=0 a3=7ffcd913e28c items=0 ppid=1368 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:05:59.009000 audit[1421]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.009000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffca8584540 a2=0 a3=7ffca858452c items=0 ppid=1368 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:05:59.010000 audit[1422]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.010000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffca2718000 a2=0 a3=7ffca2717fec items=0 ppid=1368 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:05:59.017183 kernel: Initializing XFRM netlink socket Feb 12 22:05:59.058802 env[1368]: time="2024-02-12T22:05:59.058776341Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 22:05:59.092000 audit[1430]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.092000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeadf3c850 a2=0 a3=7ffeadf3c83c items=0 ppid=1368 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 22:05:59.103000 audit[1433]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.103000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff506e3580 a2=0 a3=7fff506e356c items=0 ppid=1368 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 22:05:59.106000 audit[1436]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.106000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe2aa9da10 a2=0 a3=7ffe2aa9d9fc items=0 ppid=1368 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 22:05:59.107000 audit[1438]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.107000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffff66732a0 a2=0 a3=7ffff667328c items=0 ppid=1368 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 22:05:59.109000 audit[1440]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.109000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdcf0518e0 a2=0 a3=7ffdcf0518cc items=0 ppid=1368 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 22:05:59.111000 audit[1442]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.111000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffed31692a0 a2=0 a3=7ffed316928c items=0 ppid=1368 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 22:05:59.112000 audit[1444]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.112000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffaa6f0400 a2=0 a3=7fffaa6f03ec items=0 ppid=1368 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 22:05:59.131000 audit[1447]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.131000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd9b791430 a2=0 a3=7ffd9b79141c items=0 ppid=1368 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 22:05:59.134000 audit[1449]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.134000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcb61fa5e0 a2=0 a3=7ffcb61fa5cc items=0 ppid=1368 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:05:59.136000 audit[1451]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.136000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd688bfde0 a2=0 a3=7ffd688bfdcc items=0 ppid=1368 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:05:59.137000 audit[1453]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.137000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd11c1dfd0 a2=0 a3=7ffd11c1dfbc items=0 ppid=1368 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.137000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 22:05:59.139031 systemd-networkd[1062]: docker0: Link UP Feb 12 22:05:59.142000 audit[1457]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.142000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffaa143470 a2=0 a3=7fffaa14345c items=0 ppid=1368 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:05:59.143000 audit[1458]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:05:59.143000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffea243d090 a2=0 a3=7ffea243d07c items=0 ppid=1368 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:05:59.143000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:05:59.144840 env[1368]: time="2024-02-12T22:05:59.144818034Z" level=info msg="Loading containers: done." Feb 12 22:05:59.153936 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3053528995-merged.mount: Deactivated successfully. Feb 12 22:05:59.158656 env[1368]: time="2024-02-12T22:05:59.158635370Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 22:05:59.158861 env[1368]: time="2024-02-12T22:05:59.158847480Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 22:05:59.158974 env[1368]: time="2024-02-12T22:05:59.158963950Z" level=info msg="Daemon has completed initialization" Feb 12 22:05:59.164807 systemd[1]: Started docker.service. Feb 12 22:05:59.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:59.169711 env[1368]: time="2024-02-12T22:05:59.169681452Z" level=info msg="API listen on /run/docker.sock" Feb 12 22:05:59.180365 systemd[1]: Reloading. Feb 12 22:05:59.224099 /usr/lib/systemd/system-generators/torcx-generator[1504]: time="2024-02-12T22:05:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:05:59.224119 /usr/lib/systemd/system-generators/torcx-generator[1504]: time="2024-02-12T22:05:59Z" level=info msg="torcx already run" Feb 12 22:05:59.272702 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:05:59.272716 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:05:59.283716 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit: BPF prog-id=37 op=LOAD Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit: BPF prog-id=38 op=LOAD Feb 12 22:05:59.320000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:05:59.320000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit: BPF prog-id=39 op=LOAD Feb 12 22:05:59.321000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit: BPF prog-id=40 op=LOAD Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.321000 audit: BPF prog-id=41 op=LOAD Feb 12 22:05:59.321000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:05:59.321000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit: BPF prog-id=42 op=LOAD Feb 12 22:05:59.322000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit: BPF prog-id=43 op=LOAD Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit: BPF prog-id=44 op=LOAD Feb 12 22:05:59.322000 audit: BPF prog-id=33 op=UNLOAD Feb 12 22:05:59.322000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit: BPF prog-id=45 op=LOAD Feb 12 22:05:59.323000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit: BPF prog-id=46 op=LOAD Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit: BPF prog-id=47 op=LOAD Feb 12 22:05:59.323000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:05:59.323000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.323000 audit: BPF prog-id=48 op=LOAD Feb 12 22:05:59.323000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.324000 audit: BPF prog-id=49 op=LOAD Feb 12 22:05:59.324000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit: BPF prog-id=50 op=LOAD Feb 12 22:05:59.325000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:05:59.326000 audit: BPF prog-id=51 op=LOAD Feb 12 22:05:59.326000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:05:59.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:05:59.331627 systemd[1]: Started kubelet.service. Feb 12 22:05:59.369362 kubelet[1563]: E0212 22:05:59.369335 1563 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 22:05:59.370617 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:05:59.370691 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:05:59.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:06:00.028452 env[1153]: time="2024-02-12T22:06:00.028259038Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 12 22:06:00.596426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1055119586.mount: Deactivated successfully. Feb 12 22:06:01.932981 env[1153]: time="2024-02-12T22:06:01.932948123Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:01.933771 env[1153]: time="2024-02-12T22:06:01.933754650Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:01.934744 env[1153]: time="2024-02-12T22:06:01.934730177Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:01.935794 env[1153]: time="2024-02-12T22:06:01.935779115Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:01.936256 env[1153]: time="2024-02-12T22:06:01.936239591Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 12 22:06:01.942413 env[1153]: time="2024-02-12T22:06:01.942393344Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 12 22:06:02.559390 update_engine[1139]: I0212 22:06:02.559198 1139 update_attempter.cc:509] Updating boot flags... Feb 12 22:06:03.599809 env[1153]: time="2024-02-12T22:06:03.599766828Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:03.601213 env[1153]: time="2024-02-12T22:06:03.601197851Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:03.602411 env[1153]: time="2024-02-12T22:06:03.602397042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:03.603574 env[1153]: time="2024-02-12T22:06:03.603559816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:03.603989 env[1153]: time="2024-02-12T22:06:03.603970184Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 12 22:06:03.610991 env[1153]: time="2024-02-12T22:06:03.610969660Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 12 22:06:05.004525 env[1153]: time="2024-02-12T22:06:05.004471692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:05.005219 env[1153]: time="2024-02-12T22:06:05.005201784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:05.006139 env[1153]: time="2024-02-12T22:06:05.006124508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:05.007098 env[1153]: time="2024-02-12T22:06:05.007083302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:05.007572 env[1153]: time="2024-02-12T22:06:05.007556115Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 12 22:06:05.014673 env[1153]: time="2024-02-12T22:06:05.014647474Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 22:06:05.865050 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2338974765.mount: Deactivated successfully. Feb 12 22:06:06.332521 env[1153]: time="2024-02-12T22:06:06.332353118Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.344830 env[1153]: time="2024-02-12T22:06:06.344806656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.347057 env[1153]: time="2024-02-12T22:06:06.347034648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.354548 env[1153]: time="2024-02-12T22:06:06.354524396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.354712 env[1153]: time="2024-02-12T22:06:06.354688658Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 22:06:06.362159 env[1153]: time="2024-02-12T22:06:06.362138614Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 22:06:06.835894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1149896927.mount: Deactivated successfully. Feb 12 22:06:06.837931 env[1153]: time="2024-02-12T22:06:06.837905267Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.838488 env[1153]: time="2024-02-12T22:06:06.838471690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.839233 env[1153]: time="2024-02-12T22:06:06.839219117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.839987 env[1153]: time="2024-02-12T22:06:06.839972559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:06.840356 env[1153]: time="2024-02-12T22:06:06.840341933Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 22:06:06.845730 env[1153]: time="2024-02-12T22:06:06.845714729Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 12 22:06:07.355980 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3444912022.mount: Deactivated successfully. Feb 12 22:06:09.555721 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 22:06:09.555847 systemd[1]: Stopped kubelet.service. Feb 12 22:06:09.560655 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 22:06:09.560703 kernel: audit: type=1130 audit(1707775569.554:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:09.560723 kernel: audit: type=1131 audit(1707775569.554:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:09.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:09.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:09.557111 systemd[1]: Started kubelet.service. Feb 12 22:06:09.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:09.565571 kernel: audit: type=1130 audit(1707775569.556:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:09.615617 kubelet[1627]: E0212 22:06:09.615591 1627 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 22:06:09.617758 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:06:09.617836 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:06:09.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:06:09.621190 kernel: audit: type=1131 audit(1707775569.616:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:06:10.909752 env[1153]: time="2024-02-12T22:06:10.909722284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:10.912616 env[1153]: time="2024-02-12T22:06:10.912596839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:10.913229 env[1153]: time="2024-02-12T22:06:10.913216014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:10.913775 env[1153]: time="2024-02-12T22:06:10.913758648Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 12 22:06:10.914715 env[1153]: time="2024-02-12T22:06:10.914587187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:10.924895 env[1153]: time="2024-02-12T22:06:10.924872618Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 22:06:11.409382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3019371543.mount: Deactivated successfully. Feb 12 22:06:12.245809 env[1153]: time="2024-02-12T22:06:12.245776540Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:12.246670 env[1153]: time="2024-02-12T22:06:12.246653280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:12.247601 env[1153]: time="2024-02-12T22:06:12.247584773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:12.248693 env[1153]: time="2024-02-12T22:06:12.248676760Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:12.248957 env[1153]: time="2024-02-12T22:06:12.248940076Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 22:06:13.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:13.913224 systemd[1]: Stopped kubelet.service. Feb 12 22:06:13.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:13.919326 kernel: audit: type=1130 audit(1707775573.912:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:13.919367 kernel: audit: type=1131 audit(1707775573.913:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:13.928036 systemd[1]: Reloading. Feb 12 22:06:13.970005 /usr/lib/systemd/system-generators/torcx-generator[1720]: time="2024-02-12T22:06:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:06:13.970020 /usr/lib/systemd/system-generators/torcx-generator[1720]: time="2024-02-12T22:06:13Z" level=info msg="torcx already run" Feb 12 22:06:14.024136 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:06:14.024152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:06:14.035305 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:06:14.080349 kernel: audit: type=1400 audit(1707775574.074:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080434 kernel: audit: type=1400 audit(1707775574.074:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit: BPF prog-id=52 op=LOAD Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit: BPF prog-id=53 op=LOAD Feb 12 22:06:14.079000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:06:14.079000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit: BPF prog-id=54 op=LOAD Feb 12 22:06:14.085179 kernel: audit: type=1400 audit(1707775574.074:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085212 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:06:14.079000 audit: BPF prog-id=39 op=UNLOAD Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit: BPF prog-id=55 op=LOAD Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.079000 audit: BPF prog-id=56 op=LOAD Feb 12 22:06:14.079000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:06:14.079000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit: BPF prog-id=57 op=LOAD Feb 12 22:06:14.083000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit: BPF prog-id=58 op=LOAD Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit: BPF prog-id=59 op=LOAD Feb 12 22:06:14.084000 audit: BPF prog-id=43 op=UNLOAD Feb 12 22:06:14.084000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit: BPF prog-id=60 op=LOAD Feb 12 22:06:14.084000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit: BPF prog-id=61 op=LOAD Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.084000 audit: BPF prog-id=62 op=LOAD Feb 12 22:06:14.084000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:06:14.084000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.085000 audit: BPF prog-id=63 op=LOAD Feb 12 22:06:14.085000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.086000 audit: BPF prog-id=64 op=LOAD Feb 12 22:06:14.086000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit: BPF prog-id=65 op=LOAD Feb 12 22:06:14.087000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.087000 audit: BPF prog-id=66 op=LOAD Feb 12 22:06:14.087000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:06:14.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:14.098101 systemd[1]: Started kubelet.service. Feb 12 22:06:14.129182 kubelet[1781]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:06:14.129182 kubelet[1781]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 22:06:14.129182 kubelet[1781]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:06:14.129415 kubelet[1781]: I0212 22:06:14.129219 1781 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:06:14.253544 kubelet[1781]: I0212 22:06:14.253488 1781 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 22:06:14.253544 kubelet[1781]: I0212 22:06:14.253507 1781 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:06:14.253738 kubelet[1781]: I0212 22:06:14.253726 1781 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 22:06:14.272366 kubelet[1781]: E0212 22:06:14.272350 1781 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.272567 kubelet[1781]: I0212 22:06:14.272558 1781 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:06:14.279246 kubelet[1781]: I0212 22:06:14.279228 1781 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:06:14.279365 kubelet[1781]: I0212 22:06:14.279352 1781 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:06:14.279489 kubelet[1781]: I0212 22:06:14.279475 1781 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 22:06:14.279564 kubelet[1781]: I0212 22:06:14.279494 1781 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 22:06:14.279564 kubelet[1781]: I0212 22:06:14.279500 1781 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 22:06:14.280159 kubelet[1781]: I0212 22:06:14.280148 1781 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:06:14.281632 kubelet[1781]: I0212 22:06:14.281621 1781 kubelet.go:393] "Attempting to sync node with API server" Feb 12 22:06:14.281662 kubelet[1781]: I0212 22:06:14.281637 1781 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:06:14.281662 kubelet[1781]: I0212 22:06:14.281654 1781 kubelet.go:309] "Adding apiserver pod source" Feb 12 22:06:14.282021 kubelet[1781]: W0212 22:06:14.281998 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.282049 kubelet[1781]: E0212 22:06:14.282028 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.283213 kubelet[1781]: I0212 22:06:14.283204 1781 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:06:14.284141 kubelet[1781]: W0212 22:06:14.284124 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.284221 kubelet[1781]: E0212 22:06:14.284214 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.284320 kubelet[1781]: I0212 22:06:14.284312 1781 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:06:14.285190 kubelet[1781]: W0212 22:06:14.285183 1781 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:06:14.286695 kubelet[1781]: I0212 22:06:14.286687 1781 server.go:1232] "Started kubelet" Feb 12 22:06:14.288894 kubelet[1781]: I0212 22:06:14.288881 1781 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:06:14.289342 kubelet[1781]: I0212 22:06:14.289330 1781 server.go:462] "Adding debug handlers to kubelet server" Feb 12 22:06:14.289397 kubelet[1781]: I0212 22:06:14.289389 1781 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 22:06:14.289617 kubelet[1781]: I0212 22:06:14.289609 1781 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 22:06:14.289808 kubelet[1781]: E0212 22:06:14.289755 1781 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33cd62d721b07", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 6, 14, 286670599, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 6, 14, 286670599, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://139.178.70.105:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.105:6443: connect: connection refused'(may retry after sleeping) Feb 12 22:06:14.289000 audit[1781]: AVC avc: denied { mac_admin } for pid=1781 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.289000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:06:14.289000 audit[1781]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00084ac00 a1=c000864480 a2=c00084abd0 a3=25 items=0 ppid=1 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.289000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:06:14.291056 kubelet[1781]: I0212 22:06:14.291047 1781 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:06:14.289000 audit[1781]: AVC avc: denied { mac_admin } for pid=1781 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.289000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:06:14.289000 audit[1781]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5f9c0 a1=c000864498 a2=c00084ac90 a3=25 items=0 ppid=1 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.289000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:06:14.291300 kubelet[1781]: I0212 22:06:14.291293 1781 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:06:14.291382 kubelet[1781]: I0212 22:06:14.291375 1781 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:06:14.291527 kubelet[1781]: E0212 22:06:14.291513 1781 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:06:14.291564 kubelet[1781]: E0212 22:06:14.291529 1781 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:06:14.296234 kubelet[1781]: E0212 22:06:14.296216 1781 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 22:06:14.296234 kubelet[1781]: I0212 22:06:14.296237 1781 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 22:06:14.296311 kubelet[1781]: I0212 22:06:14.296305 1781 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:06:14.296354 kubelet[1781]: I0212 22:06:14.296345 1781 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 22:06:14.296570 kubelet[1781]: W0212 22:06:14.296548 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.296603 kubelet[1781]: E0212 22:06:14.296572 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.296694 kubelet[1781]: E0212 22:06:14.296683 1781 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="200ms" Feb 12 22:06:14.295000 audit[1792]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.295000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc6560a00 a2=0 a3=7ffdc65609ec items=0 ppid=1781 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:06:14.297000 audit[1793]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.297000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe092943b0 a2=0 a3=7ffe0929439c items=0 ppid=1781 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:06:14.301000 audit[1795]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.301000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2a2bd720 a2=0 a3=7ffc2a2bd70c items=0 ppid=1781 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:06:14.303000 audit[1797]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.303000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1564edc0 a2=0 a3=7ffe1564edac items=0 ppid=1781 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:06:14.309000 audit[1800]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.309000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff17229a60 a2=0 a3=7fff17229a4c items=0 ppid=1781 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:06:14.310557 kubelet[1781]: I0212 22:06:14.310544 1781 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 22:06:14.310000 audit[1801]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:14.310000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce5aab4e0 a2=0 a3=7ffce5aab4cc items=0 ppid=1781 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:06:14.311376 kubelet[1781]: I0212 22:06:14.311369 1781 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 22:06:14.312145 kubelet[1781]: I0212 22:06:14.312138 1781 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 22:06:14.312218 kubelet[1781]: I0212 22:06:14.312211 1781 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 22:06:14.312290 kubelet[1781]: E0212 22:06:14.312284 1781 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:06:14.311000 audit[1802]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.311000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5e72d360 a2=0 a3=7ffe5e72d34c items=0 ppid=1781 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:06:14.312000 audit[1804]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.312000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd23ee700 a2=0 a3=7fffd23ee6ec items=0 ppid=1781 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:06:14.313000 audit[1805]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:14.313000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc76badd10 a2=0 a3=7ffc76badcfc items=0 ppid=1781 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:06:14.313000 audit[1806]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:14.313000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe55099730 a2=0 a3=7ffe5509971c items=0 ppid=1781 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:06:14.314000 audit[1807]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:14.314000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff7ae8b030 a2=0 a3=7fff7ae8b01c items=0 ppid=1781 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:06:14.314000 audit[1808]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:14.314000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea574fa20 a2=0 a3=7ffea574fa0c items=0 ppid=1781 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:06:14.316403 kubelet[1781]: W0212 22:06:14.316381 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.316473 kubelet[1781]: E0212 22:06:14.316465 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:14.324580 kubelet[1781]: I0212 22:06:14.324568 1781 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:06:14.324699 kubelet[1781]: I0212 22:06:14.324692 1781 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:06:14.324760 kubelet[1781]: I0212 22:06:14.324753 1781 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:06:14.362528 kubelet[1781]: I0212 22:06:14.362507 1781 policy_none.go:49] "None policy: Start" Feb 12 22:06:14.363150 kubelet[1781]: I0212 22:06:14.363142 1781 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:06:14.363224 kubelet[1781]: I0212 22:06:14.363217 1781 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:06:14.397433 kubelet[1781]: I0212 22:06:14.397408 1781 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:06:14.416368 kubelet[1781]: E0212 22:06:14.397739 1781 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Feb 12 22:06:14.416368 kubelet[1781]: E0212 22:06:14.412868 1781 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 22:06:14.433434 systemd[1]: Created slice kubepods.slice. Feb 12 22:06:14.435948 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:06:14.437848 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:06:14.443624 kubelet[1781]: I0212 22:06:14.443608 1781 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:06:14.442000 audit[1781]: AVC avc: denied { mac_admin } for pid=1781 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:14.442000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:06:14.442000 audit[1781]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010a78f0 a1=c0010e4f60 a2=c0010a78c0 a3=25 items=0 ppid=1 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:14.442000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:06:14.443829 kubelet[1781]: I0212 22:06:14.443645 1781 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:06:14.443829 kubelet[1781]: I0212 22:06:14.443758 1781 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:06:14.445307 kubelet[1781]: E0212 22:06:14.445297 1781 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 22:06:14.497623 kubelet[1781]: E0212 22:06:14.497604 1781 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="400ms" Feb 12 22:06:14.598875 kubelet[1781]: I0212 22:06:14.598858 1781 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:06:14.599197 kubelet[1781]: E0212 22:06:14.599187 1781 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Feb 12 22:06:14.613652 kubelet[1781]: I0212 22:06:14.613638 1781 topology_manager.go:215] "Topology Admit Handler" podUID="5ac23802b5d3e557dc395f48c25ba06c" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 12 22:06:14.614504 kubelet[1781]: I0212 22:06:14.614492 1781 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 12 22:06:14.615465 kubelet[1781]: I0212 22:06:14.615454 1781 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 12 22:06:14.619763 systemd[1]: Created slice kubepods-burstable-pod5ac23802b5d3e557dc395f48c25ba06c.slice. Feb 12 22:06:14.627050 systemd[1]: Created slice kubepods-burstable-pod212dcc5e2f08bec92c239ac5786b7e2b.slice. Feb 12 22:06:14.634005 systemd[1]: Created slice kubepods-burstable-podd0325d16aab19669b5fea4b6623890e6.slice. Feb 12 22:06:14.698401 kubelet[1781]: I0212 22:06:14.698379 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5ac23802b5d3e557dc395f48c25ba06c-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5ac23802b5d3e557dc395f48c25ba06c\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:14.698555 kubelet[1781]: I0212 22:06:14.698544 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5ac23802b5d3e557dc395f48c25ba06c-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5ac23802b5d3e557dc395f48c25ba06c\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:14.698647 kubelet[1781]: I0212 22:06:14.698637 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:14.698733 kubelet[1781]: I0212 22:06:14.698724 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:14.698834 kubelet[1781]: I0212 22:06:14.698825 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:14.698921 kubelet[1781]: I0212 22:06:14.698912 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:14.699009 kubelet[1781]: I0212 22:06:14.699000 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5ac23802b5d3e557dc395f48c25ba06c-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5ac23802b5d3e557dc395f48c25ba06c\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:14.699110 kubelet[1781]: I0212 22:06:14.699102 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:14.699204 kubelet[1781]: I0212 22:06:14.699195 1781 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 12 22:06:14.898766 kubelet[1781]: E0212 22:06:14.898676 1781 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="800ms" Feb 12 22:06:14.933489 env[1153]: time="2024-02-12T22:06:14.933319984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5ac23802b5d3e557dc395f48c25ba06c,Namespace:kube-system,Attempt:0,}" Feb 12 22:06:14.933489 env[1153]: time="2024-02-12T22:06:14.933381582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,}" Feb 12 22:06:14.936118 env[1153]: time="2024-02-12T22:06:14.936086878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,}" Feb 12 22:06:15.000196 kubelet[1781]: I0212 22:06:15.000163 1781 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:06:15.000536 kubelet[1781]: E0212 22:06:15.000515 1781 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Feb 12 22:06:15.506437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2119285260.mount: Deactivated successfully. Feb 12 22:06:15.507424 env[1153]: time="2024-02-12T22:06:15.507402908Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.508116 env[1153]: time="2024-02-12T22:06:15.508103234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.509428 env[1153]: time="2024-02-12T22:06:15.509408771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.510041 env[1153]: time="2024-02-12T22:06:15.510029298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.511505 env[1153]: time="2024-02-12T22:06:15.511492355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.513270 env[1153]: time="2024-02-12T22:06:15.513257698Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.516490 env[1153]: time="2024-02-12T22:06:15.516472443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.517166 env[1153]: time="2024-02-12T22:06:15.517150038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.528247 env[1153]: time="2024-02-12T22:06:15.528227629Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.528732 env[1153]: time="2024-02-12T22:06:15.528719819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.529132 env[1153]: time="2024-02-12T22:06:15.529120884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.529536 env[1153]: time="2024-02-12T22:06:15.529524599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:15.536534 env[1153]: time="2024-02-12T22:06:15.536499247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:15.536651 env[1153]: time="2024-02-12T22:06:15.536633071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:15.536710 env[1153]: time="2024-02-12T22:06:15.536697369Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:15.536854 env[1153]: time="2024-02-12T22:06:15.536839349Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71e94d141d3e80f2b8ecec09998d219f6894126f7bd931c6e656e3a2d83f368f pid=1831 runtime=io.containerd.runc.v2 Feb 12 22:06:15.540028 env[1153]: time="2024-02-12T22:06:15.539896407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:15.540028 env[1153]: time="2024-02-12T22:06:15.539920667Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:15.540028 env[1153]: time="2024-02-12T22:06:15.539927479Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:15.540558 env[1153]: time="2024-02-12T22:06:15.540210587Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3cef4ab887371a3e688fc89f13a7c39b43e9f27acb75b96db18b7ae137953ac pid=1818 runtime=io.containerd.runc.v2 Feb 12 22:06:15.544524 env[1153]: time="2024-02-12T22:06:15.544496047Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:15.544676 env[1153]: time="2024-02-12T22:06:15.544661253Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:15.544800 env[1153]: time="2024-02-12T22:06:15.544778069Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:15.545135 env[1153]: time="2024-02-12T22:06:15.545118803Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75710e1a3d81bb597b2c8a3be14d572b7af0b04bb684910712a744cc481f76b1 pid=1853 runtime=io.containerd.runc.v2 Feb 12 22:06:15.554334 systemd[1]: Started cri-containerd-f3cef4ab887371a3e688fc89f13a7c39b43e9f27acb75b96db18b7ae137953ac.scope. Feb 12 22:06:15.565207 systemd[1]: Started cri-containerd-71e94d141d3e80f2b8ecec09998d219f6894126f7bd931c6e656e3a2d83f368f.scope. Feb 12 22:06:15.576245 systemd[1]: Started cri-containerd-75710e1a3d81bb597b2c8a3be14d572b7af0b04bb684910712a744cc481f76b1.scope. Feb 12 22:06:15.590193 kernel: kauditd_printk_skb: 219 callbacks suppressed Feb 12 22:06:15.590259 kernel: audit: type=1400 audit(1707775575.581:582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590278 kernel: audit: type=1400 audit(1707775575.581:583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590292 kernel: audit: type=1400 audit(1707775575.581:584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.597344 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:06:15.597393 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:06:15.597417 kernel: audit: backlog limit exceeded Feb 12 22:06:15.597435 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:06:15.597447 kernel: audit: type=1400 audit(1707775575.581:585): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.597463 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:06:15.597475 kernel: audit: type=1400 audit(1707775575.581:586): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit: BPF prog-id=67 op=LOAD Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.586000 audit: BPF prog-id=68 op=LOAD Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1831 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731653934643134316433653830663262386563656330393939386432 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1831 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731653934643134316433653830663262386563656330393939386432 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit: BPF prog-id=69 op=LOAD Feb 12 22:06:15.589000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019c590 items=0 ppid=1831 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731653934643134316433653830663262386563656330393939386432 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1818 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633636566346162383837333731613365363838666338396631336137 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1818 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633636566346162383837333731613365363838666338396631336137 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit: BPF prog-id=70 op=LOAD Feb 12 22:06:15.590000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000319b70 items=0 ppid=1818 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633636566346162383837333731613365363838666338396631336137 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.590000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1853 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373130653161336438316262353937623263386133626531346435 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1853 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373130653161336438316262353937623263386133626531346435 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit: BPF prog-id=72 op=LOAD Feb 12 22:06:15.599000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003daeb0 items=0 ppid=1853 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373130653161336438316262353937623263386133626531346435 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit: BPF prog-id=73 op=LOAD Feb 12 22:06:15.599000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003daef8 items=0 ppid=1853 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373130653161336438316262353937623263386133626531346435 Feb 12 22:06:15.599000 audit: BPF prog-id=73 op=UNLOAD Feb 12 22:06:15.599000 audit: BPF prog-id=72 op=UNLOAD Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit: BPF prog-id=74 op=LOAD Feb 12 22:06:15.599000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003db308 items=0 ppid=1853 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373130653161336438316262353937623263386133626531346435 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.589000 audit: BPF prog-id=75 op=LOAD Feb 12 22:06:15.589000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019c5d8 items=0 ppid=1831 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731653934643134316433653830663262386563656330393939386432 Feb 12 22:06:15.599000 audit: BPF prog-id=75 op=UNLOAD Feb 12 22:06:15.599000 audit: BPF prog-id=69 op=UNLOAD Feb 12 22:06:15.590000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000319bb8 items=0 ppid=1818 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633636566346162383837333731613365363838666338396631336137 Feb 12 22:06:15.599000 audit: BPF prog-id=77 op=UNLOAD Feb 12 22:06:15.599000 audit: BPF prog-id=70 op=UNLOAD Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.599000 audit: BPF prog-id=78 op=LOAD Feb 12 22:06:15.599000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000319fc8 items=0 ppid=1818 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633636566346162383837333731613365363838666338396631336137 Feb 12 22:06:15.629039 env[1153]: time="2024-02-12T22:06:15.628570771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"71e94d141d3e80f2b8ecec09998d219f6894126f7bd931c6e656e3a2d83f368f\"" Feb 12 22:06:15.631376 env[1153]: time="2024-02-12T22:06:15.631300018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5ac23802b5d3e557dc395f48c25ba06c,Namespace:kube-system,Attempt:0,} returns sandbox id \"f3cef4ab887371a3e688fc89f13a7c39b43e9f27acb75b96db18b7ae137953ac\"" Feb 12 22:06:15.631594 env[1153]: time="2024-02-12T22:06:15.631577692Z" level=info msg="CreateContainer within sandbox \"71e94d141d3e80f2b8ecec09998d219f6894126f7bd931c6e656e3a2d83f368f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 22:06:15.633954 env[1153]: time="2024-02-12T22:06:15.633936956Z" level=info msg="CreateContainer within sandbox \"f3cef4ab887371a3e688fc89f13a7c39b43e9f27acb75b96db18b7ae137953ac\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 22:06:15.641729 env[1153]: time="2024-02-12T22:06:15.641704351Z" level=info msg="CreateContainer within sandbox \"71e94d141d3e80f2b8ecec09998d219f6894126f7bd931c6e656e3a2d83f368f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d44d492669bfce3b4459a8bfb77462aa102098600d48b466fafaec4ab2f37ea1\"" Feb 12 22:06:15.642001 env[1153]: time="2024-02-12T22:06:15.641984513Z" level=info msg="StartContainer for \"d44d492669bfce3b4459a8bfb77462aa102098600d48b466fafaec4ab2f37ea1\"" Feb 12 22:06:15.643555 env[1153]: time="2024-02-12T22:06:15.643527758Z" level=info msg="CreateContainer within sandbox \"f3cef4ab887371a3e688fc89f13a7c39b43e9f27acb75b96db18b7ae137953ac\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"888ad0d4b28c4563315a529932303fdc9e903a567d0ab3facbf2a0e1647a52bf\"" Feb 12 22:06:15.643711 env[1153]: time="2024-02-12T22:06:15.643692782Z" level=info msg="StartContainer for \"888ad0d4b28c4563315a529932303fdc9e903a567d0ab3facbf2a0e1647a52bf\"" Feb 12 22:06:15.647600 env[1153]: time="2024-02-12T22:06:15.647578419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,} returns sandbox id \"75710e1a3d81bb597b2c8a3be14d572b7af0b04bb684910712a744cc481f76b1\"" Feb 12 22:06:15.648994 env[1153]: time="2024-02-12T22:06:15.648810688Z" level=info msg="CreateContainer within sandbox \"75710e1a3d81bb597b2c8a3be14d572b7af0b04bb684910712a744cc481f76b1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 22:06:15.653743 env[1153]: time="2024-02-12T22:06:15.653723482Z" level=info msg="CreateContainer within sandbox \"75710e1a3d81bb597b2c8a3be14d572b7af0b04bb684910712a744cc481f76b1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3898f2f113d8e812777635ec21e4b50700db22c7fdab8b499f45fb8851d1e74c\"" Feb 12 22:06:15.654160 env[1153]: time="2024-02-12T22:06:15.654142847Z" level=info msg="StartContainer for \"3898f2f113d8e812777635ec21e4b50700db22c7fdab8b499f45fb8851d1e74c\"" Feb 12 22:06:15.663520 systemd[1]: Started cri-containerd-888ad0d4b28c4563315a529932303fdc9e903a567d0ab3facbf2a0e1647a52bf.scope. Feb 12 22:06:15.674803 systemd[1]: Started cri-containerd-d44d492669bfce3b4459a8bfb77462aa102098600d48b466fafaec4ab2f37ea1.scope. Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit: BPF prog-id=79 op=LOAD Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1818 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386164306434623238633435363333313561353239393332333033 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1818 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386164306434623238633435363333313561353239393332333033 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit: BPF prog-id=80 op=LOAD Feb 12 22:06:15.675000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021f3a0 items=0 ppid=1818 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386164306434623238633435363333313561353239393332333033 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit: BPF prog-id=81 op=LOAD Feb 12 22:06:15.675000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021f3e8 items=0 ppid=1818 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386164306434623238633435363333313561353239393332333033 Feb 12 22:06:15.675000 audit: BPF prog-id=81 op=UNLOAD Feb 12 22:06:15.675000 audit: BPF prog-id=80 op=UNLOAD Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.675000 audit: BPF prog-id=82 op=LOAD Feb 12 22:06:15.675000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f7f8 items=0 ppid=1818 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386164306434623238633435363333313561353239393332333033 Feb 12 22:06:15.688208 systemd[1]: Started cri-containerd-3898f2f113d8e812777635ec21e4b50700db22c7fdab8b499f45fb8851d1e74c.scope. Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit: BPF prog-id=83 op=LOAD Feb 12 22:06:15.692000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434346434393236363962666365336234343539613862666237373436 Feb 12 22:06:15.692000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.692000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434346434393236363962666365336234343539613862666237373436 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit: BPF prog-id=84 op=LOAD Feb 12 22:06:15.693000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000267f90 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434346434393236363962666365336234343539613862666237373436 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit: BPF prog-id=85 op=LOAD Feb 12 22:06:15.693000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000267fd8 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434346434393236363962666365336234343539613862666237373436 Feb 12 22:06:15.693000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:06:15.693000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.693000 audit: BPF prog-id=86 op=LOAD Feb 12 22:06:15.693000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003b63e8 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434346434393236363962666365336234343539613862666237373436 Feb 12 22:06:15.699479 kubelet[1781]: E0212 22:06:15.699459 1781 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="1.6s" Feb 12 22:06:15.703502 kubelet[1781]: W0212 22:06:15.703460 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.703502 kubelet[1781]: E0212 22:06:15.703501 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit: BPF prog-id=87 op=LOAD Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1853 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338393866326631313364386538313237373736333565633231653462 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1853 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338393866326631313364386538313237373736333565633231653462 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit: BPF prog-id=88 op=LOAD Feb 12 22:06:15.716000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b8100 items=0 ppid=1853 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338393866326631313364386538313237373736333565633231653462 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit: BPF prog-id=89 op=LOAD Feb 12 22:06:15.716000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b8148 items=0 ppid=1853 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338393866326631313364386538313237373736333565633231653462 Feb 12 22:06:15.716000 audit: BPF prog-id=89 op=UNLOAD Feb 12 22:06:15.716000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:15.716000 audit: BPF prog-id=90 op=LOAD Feb 12 22:06:15.716000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8558 items=0 ppid=1853 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:15.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338393866326631313364386538313237373736333565633231653462 Feb 12 22:06:15.719863 env[1153]: time="2024-02-12T22:06:15.719832585Z" level=info msg="StartContainer for \"888ad0d4b28c4563315a529932303fdc9e903a567d0ab3facbf2a0e1647a52bf\" returns successfully" Feb 12 22:06:15.731295 env[1153]: time="2024-02-12T22:06:15.731257210Z" level=info msg="StartContainer for \"d44d492669bfce3b4459a8bfb77462aa102098600d48b466fafaec4ab2f37ea1\" returns successfully" Feb 12 22:06:15.752280 env[1153]: time="2024-02-12T22:06:15.752251180Z" level=info msg="StartContainer for \"3898f2f113d8e812777635ec21e4b50700db22c7fdab8b499f45fb8851d1e74c\" returns successfully" Feb 12 22:06:15.801875 kubelet[1781]: I0212 22:06:15.801597 1781 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:06:15.801875 kubelet[1781]: E0212 22:06:15.801811 1781 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Feb 12 22:06:15.822585 kubelet[1781]: W0212 22:06:15.822531 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.822585 kubelet[1781]: E0212 22:06:15.822571 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.836977 kubelet[1781]: W0212 22:06:15.836916 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.836977 kubelet[1781]: E0212 22:06:15.836953 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.849379 kubelet[1781]: W0212 22:06:15.849325 1781 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:15.849379 kubelet[1781]: E0212 22:06:15.849362 1781 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:16.421304 kubelet[1781]: E0212 22:06:16.421280 1781 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.105:6443: connect: connection refused Feb 12 22:06:16.886000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:16.886000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004087b0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:16.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:16.887000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:16.887000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000358800 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:16.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:17.403129 kubelet[1781]: I0212 22:06:17.402850 1781 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:06:17.446000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:17.446000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c009495bc0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:06:17.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:06:17.446000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:17.446000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005eaca40 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:06:17.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:06:17.446000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:17.446000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c009495ce0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:06:17.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:06:17.450000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:17.450000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0032850c0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:06:17.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:06:17.450000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:17.450000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0036b9710 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:06:17.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:06:17.454000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:17.454000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c00376ab10 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:06:17.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:06:17.489618 kubelet[1781]: E0212 22:06:17.489599 1781 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 12 22:06:17.579300 kubelet[1781]: I0212 22:06:17.579281 1781 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 22:06:18.286459 kubelet[1781]: I0212 22:06:18.286430 1781 apiserver.go:52] "Watching apiserver" Feb 12 22:06:18.296376 kubelet[1781]: I0212 22:06:18.296360 1781 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:06:19.718859 systemd[1]: Reloading. Feb 12 22:06:19.767858 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2024-02-12T22:06:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:06:19.768092 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2024-02-12T22:06:19Z" level=info msg="torcx already run" Feb 12 22:06:19.818614 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:06:19.818728 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:06:19.830627 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.874000 audit: BPF prog-id=91 op=LOAD Feb 12 22:06:19.875000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.875000 audit: BPF prog-id=92 op=LOAD Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit: BPF prog-id=93 op=LOAD Feb 12 22:06:19.876000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:06:19.876000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.876000 audit: BPF prog-id=94 op=LOAD Feb 12 22:06:19.877000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit: BPF prog-id=95 op=LOAD Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.877000 audit: BPF prog-id=96 op=LOAD Feb 12 22:06:19.877000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:06:19.877000 audit: BPF prog-id=56 op=UNLOAD Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit: BPF prog-id=97 op=LOAD Feb 12 22:06:19.878000 audit: BPF prog-id=83 op=UNLOAD Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.879000 audit: BPF prog-id=98 op=LOAD Feb 12 22:06:19.879000 audit: BPF prog-id=79 op=UNLOAD Feb 12 22:06:19.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit: BPF prog-id=99 op=LOAD Feb 12 22:06:19.880000 audit: BPF prog-id=57 op=UNLOAD Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.880000 audit: BPF prog-id=100 op=LOAD Feb 12 22:06:19.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit: BPF prog-id=101 op=LOAD Feb 12 22:06:19.881000 audit: BPF prog-id=58 op=UNLOAD Feb 12 22:06:19.881000 audit: BPF prog-id=59 op=UNLOAD Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit: BPF prog-id=102 op=LOAD Feb 12 22:06:19.882000 audit: BPF prog-id=60 op=UNLOAD Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit: BPF prog-id=103 op=LOAD Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit: BPF prog-id=104 op=LOAD Feb 12 22:06:19.883000 audit: BPF prog-id=61 op=UNLOAD Feb 12 22:06:19.883000 audit: BPF prog-id=62 op=UNLOAD Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit: BPF prog-id=105 op=LOAD Feb 12 22:06:19.884000 audit: BPF prog-id=63 op=UNLOAD Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit: BPF prog-id=106 op=LOAD Feb 12 22:06:19.885000 audit: BPF prog-id=67 op=UNLOAD Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit: BPF prog-id=107 op=LOAD Feb 12 22:06:19.886000 audit: BPF prog-id=71 op=UNLOAD Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.886000 audit: BPF prog-id=108 op=LOAD Feb 12 22:06:19.886000 audit: BPF prog-id=64 op=UNLOAD Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit: BPF prog-id=109 op=LOAD Feb 12 22:06:19.888000 audit: BPF prog-id=68 op=UNLOAD Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit: BPF prog-id=110 op=LOAD Feb 12 22:06:19.889000 audit: BPF prog-id=65 op=UNLOAD Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.889000 audit: BPF prog-id=111 op=LOAD Feb 12 22:06:19.889000 audit: BPF prog-id=66 op=UNLOAD Feb 12 22:06:19.896161 kubelet[1781]: I0212 22:06:19.896105 1781 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:06:19.897389 systemd[1]: Stopping kubelet.service... Feb 12 22:06:19.907407 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 22:06:19.907615 systemd[1]: Stopped kubelet.service. Feb 12 22:06:19.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:19.909088 systemd[1]: Started kubelet.service. Feb 12 22:06:19.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:19.964722 kubelet[2131]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:06:19.964929 kubelet[2131]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 22:06:19.964967 kubelet[2131]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:06:19.965056 kubelet[2131]: I0212 22:06:19.965035 2131 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:06:19.968131 kubelet[2131]: I0212 22:06:19.968116 2131 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 22:06:19.968131 kubelet[2131]: I0212 22:06:19.968129 2131 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:06:19.968247 kubelet[2131]: I0212 22:06:19.968236 2131 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 22:06:19.972997 kubelet[2131]: I0212 22:06:19.969117 2131 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 22:06:19.972997 kubelet[2131]: I0212 22:06:19.970273 2131 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:06:19.975247 kubelet[2131]: I0212 22:06:19.975232 2131 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:06:19.975361 kubelet[2131]: I0212 22:06:19.975350 2131 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:06:19.975508 kubelet[2131]: I0212 22:06:19.975497 2131 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 22:06:19.975570 kubelet[2131]: I0212 22:06:19.975515 2131 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 22:06:19.975570 kubelet[2131]: I0212 22:06:19.975526 2131 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 22:06:19.975570 kubelet[2131]: I0212 22:06:19.975550 2131 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:06:19.975837 kubelet[2131]: I0212 22:06:19.975825 2131 kubelet.go:393] "Attempting to sync node with API server" Feb 12 22:06:19.975860 kubelet[2131]: I0212 22:06:19.975845 2131 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:06:19.975881 kubelet[2131]: I0212 22:06:19.975861 2131 kubelet.go:309] "Adding apiserver pod source" Feb 12 22:06:19.975881 kubelet[2131]: I0212 22:06:19.975873 2131 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:06:19.979390 kubelet[2131]: I0212 22:06:19.979378 2131 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:06:19.980000 audit[2131]: AVC avc: denied { mac_admin } for pid=2131 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.980000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:06:19.980000 audit[2131]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001eb6b0 a1=c000815a58 a2=c0001eb650 a3=25 items=0 ppid=1 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:19.980000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:06:19.980000 audit[2131]: AVC avc: denied { mac_admin } for pid=2131 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:19.980000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:06:19.980000 audit[2131]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000be07c0 a1=c000815a70 a2=c0001eb7d0 a3=25 items=0 ppid=1 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:19.980000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:06:19.981766 kubelet[2131]: I0212 22:06:19.979672 2131 server.go:1232] "Started kubelet" Feb 12 22:06:19.981766 kubelet[2131]: I0212 22:06:19.980506 2131 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:06:19.981766 kubelet[2131]: I0212 22:06:19.980532 2131 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:06:19.981766 kubelet[2131]: I0212 22:06:19.980549 2131 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:06:19.982358 kubelet[2131]: I0212 22:06:19.982347 2131 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:06:19.982802 kubelet[2131]: I0212 22:06:19.982790 2131 server.go:462] "Adding debug handlers to kubelet server" Feb 12 22:06:19.983433 kubelet[2131]: I0212 22:06:19.983423 2131 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 22:06:19.983521 kubelet[2131]: I0212 22:06:19.983512 2131 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 22:06:19.985513 kubelet[2131]: I0212 22:06:19.985500 2131 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 22:06:19.989049 kubelet[2131]: E0212 22:06:19.989036 2131 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:06:19.989129 kubelet[2131]: E0212 22:06:19.989122 2131 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:06:19.994487 kubelet[2131]: I0212 22:06:19.994411 2131 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:06:19.994487 kubelet[2131]: I0212 22:06:19.994487 2131 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 22:06:19.996026 kubelet[2131]: I0212 22:06:19.996011 2131 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 22:06:19.996576 kubelet[2131]: I0212 22:06:19.996562 2131 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 22:06:19.996612 kubelet[2131]: I0212 22:06:19.996581 2131 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 22:06:19.996612 kubelet[2131]: I0212 22:06:19.996590 2131 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 22:06:19.996653 kubelet[2131]: E0212 22:06:19.996617 2131 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:06:20.029585 kubelet[2131]: I0212 22:06:20.029566 2131 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:06:20.029585 kubelet[2131]: I0212 22:06:20.029583 2131 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:06:20.029585 kubelet[2131]: I0212 22:06:20.029593 2131 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:06:20.029894 kubelet[2131]: I0212 22:06:20.029882 2131 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 22:06:20.029930 kubelet[2131]: I0212 22:06:20.029901 2131 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 12 22:06:20.029930 kubelet[2131]: I0212 22:06:20.029907 2131 policy_none.go:49] "None policy: Start" Feb 12 22:06:20.030246 kubelet[2131]: I0212 22:06:20.030234 2131 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:06:20.030284 kubelet[2131]: I0212 22:06:20.030247 2131 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:06:20.030507 kubelet[2131]: I0212 22:06:20.030496 2131 state_mem.go:75] "Updated machine memory state" Feb 12 22:06:20.032398 kubelet[2131]: I0212 22:06:20.032389 2131 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:06:20.032000 audit[2131]: AVC avc: denied { mac_admin } for pid=2131 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:20.032000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:06:20.032000 audit[2131]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba55c0 a1=c000d82330 a2=c000ba5590 a3=25 items=0 ppid=1 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:20.032000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:06:20.033221 kubelet[2131]: I0212 22:06:20.033208 2131 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:06:20.033344 kubelet[2131]: I0212 22:06:20.033320 2131 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:06:20.086877 kubelet[2131]: I0212 22:06:20.086852 2131 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:06:20.092144 kubelet[2131]: I0212 22:06:20.092124 2131 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 22:06:20.092244 kubelet[2131]: I0212 22:06:20.092196 2131 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 22:06:20.096935 kubelet[2131]: I0212 22:06:20.096919 2131 topology_manager.go:215] "Topology Admit Handler" podUID="5ac23802b5d3e557dc395f48c25ba06c" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 12 22:06:20.097085 kubelet[2131]: I0212 22:06:20.097073 2131 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 12 22:06:20.097221 kubelet[2131]: I0212 22:06:20.097211 2131 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 12 22:06:20.103721 kubelet[2131]: E0212 22:06:20.103702 2131 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Feb 12 22:06:20.195234 kubelet[2131]: I0212 22:06:20.195215 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5ac23802b5d3e557dc395f48c25ba06c-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5ac23802b5d3e557dc395f48c25ba06c\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:20.195356 kubelet[2131]: I0212 22:06:20.195347 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:20.195412 kubelet[2131]: I0212 22:06:20.195405 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:20.195482 kubelet[2131]: I0212 22:06:20.195475 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:20.195544 kubelet[2131]: I0212 22:06:20.195537 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:20.195596 kubelet[2131]: I0212 22:06:20.195589 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5ac23802b5d3e557dc395f48c25ba06c-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5ac23802b5d3e557dc395f48c25ba06c\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:20.195652 kubelet[2131]: I0212 22:06:20.195645 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:06:20.195706 kubelet[2131]: I0212 22:06:20.195699 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 12 22:06:20.195762 kubelet[2131]: I0212 22:06:20.195756 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5ac23802b5d3e557dc395f48c25ba06c-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5ac23802b5d3e557dc395f48c25ba06c\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:20.978048 kubelet[2131]: I0212 22:06:20.978018 2131 apiserver.go:52] "Watching apiserver" Feb 12 22:06:20.995216 kubelet[2131]: I0212 22:06:20.995192 2131 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:06:21.041141 kubelet[2131]: E0212 22:06:21.041118 2131 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 22:06:21.049395 kubelet[2131]: I0212 22:06:21.049376 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.049355061 podCreationTimestamp="2024-02-12 22:06:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:06:21.049245973 +0000 UTC m=+1.122189727" watchObservedRunningTime="2024-02-12 22:06:21.049355061 +0000 UTC m=+1.122298803" Feb 12 22:06:21.091281 kubelet[2131]: I0212 22:06:21.091263 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.091229254 podCreationTimestamp="2024-02-12 22:06:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:06:21.065068959 +0000 UTC m=+1.138012713" watchObservedRunningTime="2024-02-12 22:06:21.091229254 +0000 UTC m=+1.164172999" Feb 12 22:06:21.110878 kubelet[2131]: I0212 22:06:21.110851 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.110820833 podCreationTimestamp="2024-02-12 22:06:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:06:21.091742007 +0000 UTC m=+1.164685761" watchObservedRunningTime="2024-02-12 22:06:21.110820833 +0000 UTC m=+1.183764588" Feb 12 22:06:23.243073 sudo[1352]: pam_unix(sudo:session): session closed for user root Feb 12 22:06:23.242000 audit[1352]: USER_END pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:06:23.243777 kernel: kauditd_printk_skb: 668 callbacks suppressed Feb 12 22:06:23.243810 kernel: audit: type=1106 audit(1707775583.242:936): pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:06:23.246000 audit[1352]: CRED_DISP pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:06:23.249365 kernel: audit: type=1104 audit(1707775583.246:937): pid=1352 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:06:23.256880 sshd[1348]: pam_unix(sshd:session): session closed for user core Feb 12 22:06:23.259000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:06:23.259000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:06:23.266478 kernel: audit: type=1106 audit(1707775583.259:938): pid=1348 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:06:23.266525 kernel: audit: type=1104 audit(1707775583.259:939): pid=1348 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:06:23.269533 systemd-logind[1138]: Session 9 logged out. Waiting for processes to exit. Feb 12 22:06:23.269905 systemd[1]: sshd@6-139.178.70.105:22-139.178.89.65:44984.service: Deactivated successfully. Feb 12 22:06:23.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:23.270351 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 22:06:23.270447 systemd[1]: session-9.scope: Consumed 2.374s CPU time. Feb 12 22:06:23.271037 systemd-logind[1138]: Removed session 9. Feb 12 22:06:23.273180 kernel: audit: type=1131 audit(1707775583.269:940): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:06:23.301000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 22:06:23.301000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000efc600 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:23.309222 kernel: audit: type=1400 audit(1707775583.301:941): avc: denied { watch } for pid=1999 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 22:06:23.309261 kernel: audit: type=1300 audit(1707775583.301:941): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000efc600 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:23.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:23.312743 kernel: audit: type=1327 audit(1707775583.301:941): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.421000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.421000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6f20 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.428804 kernel: audit: type=1400 audit(1707775594.421:942): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.428898 kernel: audit: type=1300 audit(1707775594.421:942): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6f20 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.421000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.436185 kernel: audit: type=1327 audit(1707775594.421:942): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.436271 kernel: audit: type=1400 audit(1707775594.421:943): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.421000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6f60 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.440510 kernel: audit: type=1300 audit(1707775594.421:943): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6f60 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.444095 kernel: audit: type=1327 audit(1707775594.421:943): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.421000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.448192 kernel: audit: type=1400 audit(1707775594.421:944): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.421000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6fa0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.456264 kernel: audit: type=1300 audit(1707775594.421:944): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6fa0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.456345 kernel: audit: type=1327 audit(1707775594.421:944): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.421000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.459633 kernel: audit: type=1400 audit(1707775594.421:945): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:06:34.421000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce6fe0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:06:34.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:06:34.654129 kubelet[2131]: I0212 22:06:34.654107 2131 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 22:06:34.654983 env[1153]: time="2024-02-12T22:06:34.654958098Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 22:06:34.655184 kubelet[2131]: I0212 22:06:34.655077 2131 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 22:06:35.342104 kubelet[2131]: I0212 22:06:35.342079 2131 topology_manager.go:215] "Topology Admit Handler" podUID="7fe76206-54b2-44a8-8da2-07d7528b2bbc" podNamespace="kube-system" podName="kube-proxy-49f7p" Feb 12 22:06:35.350356 systemd[1]: Created slice kubepods-besteffort-pod7fe76206_54b2_44a8_8da2_07d7528b2bbc.slice. Feb 12 22:06:35.429767 kubelet[2131]: I0212 22:06:35.429740 2131 topology_manager.go:215] "Topology Admit Handler" podUID="19274772-3687-497d-ae9c-16202ad9c0c4" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-7lz6n" Feb 12 22:06:35.433095 systemd[1]: Created slice kubepods-besteffort-pod19274772_3687_497d_ae9c_16202ad9c0c4.slice. Feb 12 22:06:35.484818 kubelet[2131]: I0212 22:06:35.484795 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7fe76206-54b2-44a8-8da2-07d7528b2bbc-xtables-lock\") pod \"kube-proxy-49f7p\" (UID: \"7fe76206-54b2-44a8-8da2-07d7528b2bbc\") " pod="kube-system/kube-proxy-49f7p" Feb 12 22:06:35.484950 kubelet[2131]: I0212 22:06:35.484942 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7fe76206-54b2-44a8-8da2-07d7528b2bbc-kube-proxy\") pod \"kube-proxy-49f7p\" (UID: \"7fe76206-54b2-44a8-8da2-07d7528b2bbc\") " pod="kube-system/kube-proxy-49f7p" Feb 12 22:06:35.485010 kubelet[2131]: I0212 22:06:35.485003 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7fe76206-54b2-44a8-8da2-07d7528b2bbc-lib-modules\") pod \"kube-proxy-49f7p\" (UID: \"7fe76206-54b2-44a8-8da2-07d7528b2bbc\") " pod="kube-system/kube-proxy-49f7p" Feb 12 22:06:35.485067 kubelet[2131]: I0212 22:06:35.485060 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8rf7\" (UniqueName: \"kubernetes.io/projected/7fe76206-54b2-44a8-8da2-07d7528b2bbc-kube-api-access-x8rf7\") pod \"kube-proxy-49f7p\" (UID: \"7fe76206-54b2-44a8-8da2-07d7528b2bbc\") " pod="kube-system/kube-proxy-49f7p" Feb 12 22:06:35.585240 kubelet[2131]: I0212 22:06:35.585221 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m7h94\" (UniqueName: \"kubernetes.io/projected/19274772-3687-497d-ae9c-16202ad9c0c4-kube-api-access-m7h94\") pod \"tigera-operator-55585899bf-7lz6n\" (UID: \"19274772-3687-497d-ae9c-16202ad9c0c4\") " pod="tigera-operator/tigera-operator-55585899bf-7lz6n" Feb 12 22:06:35.585492 kubelet[2131]: I0212 22:06:35.585483 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/19274772-3687-497d-ae9c-16202ad9c0c4-var-lib-calico\") pod \"tigera-operator-55585899bf-7lz6n\" (UID: \"19274772-3687-497d-ae9c-16202ad9c0c4\") " pod="tigera-operator/tigera-operator-55585899bf-7lz6n" Feb 12 22:06:35.662079 env[1153]: time="2024-02-12T22:06:35.661646295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-49f7p,Uid:7fe76206-54b2-44a8-8da2-07d7528b2bbc,Namespace:kube-system,Attempt:0,}" Feb 12 22:06:35.680997 env[1153]: time="2024-02-12T22:06:35.680881399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:35.680997 env[1153]: time="2024-02-12T22:06:35.680908253Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:35.680997 env[1153]: time="2024-02-12T22:06:35.680915991Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:35.681165 env[1153]: time="2024-02-12T22:06:35.681006319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5045cdfbfec07b9f0900cdc9b9bde264825a634070ecba690941c6a622f3dafa pid=2214 runtime=io.containerd.runc.v2 Feb 12 22:06:35.702246 systemd[1]: Started cri-containerd-5045cdfbfec07b9f0900cdc9b9bde264825a634070ecba690941c6a622f3dafa.scope. Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit: BPF prog-id=112 op=LOAD Feb 12 22:06:35.710000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2214 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343563646662666563303762396630393030636463396239626465 Feb 12 22:06:35.710000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.710000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2214 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343563646662666563303762396630393030636463396239626465 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit: BPF prog-id=113 op=LOAD Feb 12 22:06:35.711000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024c90 items=0 ppid=2214 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343563646662666563303762396630393030636463396239626465 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.711000 audit: BPF prog-id=114 op=LOAD Feb 12 22:06:35.711000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024cd8 items=0 ppid=2214 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343563646662666563303762396630393030636463396239626465 Feb 12 22:06:35.712000 audit: BPF prog-id=114 op=UNLOAD Feb 12 22:06:35.712000 audit: BPF prog-id=113 op=UNLOAD Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.712000 audit: BPF prog-id=115 op=LOAD Feb 12 22:06:35.712000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000250e8 items=0 ppid=2214 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343563646662666563303762396630393030636463396239626465 Feb 12 22:06:35.720546 env[1153]: time="2024-02-12T22:06:35.720519371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-49f7p,Uid:7fe76206-54b2-44a8-8da2-07d7528b2bbc,Namespace:kube-system,Attempt:0,} returns sandbox id \"5045cdfbfec07b9f0900cdc9b9bde264825a634070ecba690941c6a622f3dafa\"" Feb 12 22:06:35.722148 env[1153]: time="2024-02-12T22:06:35.722130290Z" level=info msg="CreateContainer within sandbox \"5045cdfbfec07b9f0900cdc9b9bde264825a634070ecba690941c6a622f3dafa\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 22:06:35.735978 env[1153]: time="2024-02-12T22:06:35.735949670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-7lz6n,Uid:19274772-3687-497d-ae9c-16202ad9c0c4,Namespace:tigera-operator,Attempt:0,}" Feb 12 22:06:35.772856 env[1153]: time="2024-02-12T22:06:35.772819365Z" level=info msg="CreateContainer within sandbox \"5045cdfbfec07b9f0900cdc9b9bde264825a634070ecba690941c6a622f3dafa\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9e6189d4d0c6507f62e7d34031634a93685bb9b61d9f74449b4a9ecff1eefce2\"" Feb 12 22:06:35.774273 env[1153]: time="2024-02-12T22:06:35.774247900Z" level=info msg="StartContainer for \"9e6189d4d0c6507f62e7d34031634a93685bb9b61d9f74449b4a9ecff1eefce2\"" Feb 12 22:06:35.779597 env[1153]: time="2024-02-12T22:06:35.779484752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:35.779597 env[1153]: time="2024-02-12T22:06:35.779513298Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:35.779597 env[1153]: time="2024-02-12T22:06:35.779520957Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:35.779817 env[1153]: time="2024-02-12T22:06:35.779783506Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/910724dd274a17ac49cb9683cd43ad3ae890c5798058b9ed3482c093fa4fd5a3 pid=2256 runtime=io.containerd.runc.v2 Feb 12 22:06:35.788631 systemd[1]: Started cri-containerd-9e6189d4d0c6507f62e7d34031634a93685bb9b61d9f74449b4a9ecff1eefce2.scope. Feb 12 22:06:35.799388 systemd[1]: Started cri-containerd-910724dd274a17ac49cb9683cd43ad3ae890c5798058b9ed3482c093fa4fd5a3.scope. Feb 12 22:06:35.809000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.809000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fd6575d2248 items=0 ppid=2214 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965363138396434643063363530376636326537643334303331363334 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit: BPF prog-id=116 op=LOAD Feb 12 22:06:35.810000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003b8f78 items=0 ppid=2214 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965363138396434643063363530376636326537643334303331363334 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.810000 audit: BPF prog-id=117 op=LOAD Feb 12 22:06:35.810000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003b8fc8 items=0 ppid=2214 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965363138396434643063363530376636326537643334303331363334 Feb 12 22:06:35.811000 audit: BPF prog-id=117 op=UNLOAD Feb 12 22:06:35.811000 audit: BPF prog-id=116 op=UNLOAD Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.811000 audit: BPF prog-id=118 op=LOAD Feb 12 22:06:35.811000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003b9058 items=0 ppid=2214 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965363138396434643063363530376636326537643334303331363334 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.815000 audit: BPF prog-id=119 op=LOAD Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2256 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931303732346464323734613137616334396362393638336364343361 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2256 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931303732346464323734613137616334396362393638336364343361 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit: BPF prog-id=120 op=LOAD Feb 12 22:06:35.817000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000354670 items=0 ppid=2256 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931303732346464323734613137616334396362393638336364343361 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit: BPF prog-id=121 op=LOAD Feb 12 22:06:35.817000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003546b8 items=0 ppid=2256 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931303732346464323734613137616334396362393638336364343361 Feb 12 22:06:35.817000 audit: BPF prog-id=121 op=UNLOAD Feb 12 22:06:35.817000 audit: BPF prog-id=120 op=UNLOAD Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:35.817000 audit: BPF prog-id=122 op=LOAD Feb 12 22:06:35.817000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354ac8 items=0 ppid=2256 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:35.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931303732346464323734613137616334396362393638336364343361 Feb 12 22:06:35.845319 env[1153]: time="2024-02-12T22:06:35.845292534Z" level=info msg="StartContainer for \"9e6189d4d0c6507f62e7d34031634a93685bb9b61d9f74449b4a9ecff1eefce2\" returns successfully" Feb 12 22:06:35.848911 env[1153]: time="2024-02-12T22:06:35.848879382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-7lz6n,Uid:19274772-3687-497d-ae9c-16202ad9c0c4,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"910724dd274a17ac49cb9683cd43ad3ae890c5798058b9ed3482c093fa4fd5a3\"" Feb 12 22:06:35.855588 env[1153]: time="2024-02-12T22:06:35.855565396Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 22:06:36.365000 audit[2347]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.365000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6c8950c0 a2=0 a3=7ffe6c8950ac items=0 ppid=2291 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:06:36.366000 audit[2348]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.366000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec31edb40 a2=0 a3=7ffec31edb2c items=0 ppid=2291 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:06:36.366000 audit[2349]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.366000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4ddcfd70 a2=0 a3=7fff4ddcfd5c items=0 ppid=2291 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:06:36.367000 audit[2350]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.367000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9196dc70 a2=0 a3=7ffd9196dc5c items=0 ppid=2291 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:06:36.367000 audit[2351]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.367000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7e0791b0 a2=0 a3=7ffc7e07919c items=0 ppid=2291 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:06:36.368000 audit[2352]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.368000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff440a9740 a2=0 a3=7fff440a972c items=0 ppid=2291 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:06:36.469000 audit[2353]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.469000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff25018180 a2=0 a3=7fff2501816c items=0 ppid=2291 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:06:36.473000 audit[2355]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.473000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff2dd2be70 a2=0 a3=7fff2dd2be5c items=0 ppid=2291 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 22:06:36.475000 audit[2358]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.475000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffef80ecfd0 a2=0 a3=7ffef80ecfbc items=0 ppid=2291 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 22:06:36.476000 audit[2359]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.476000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7989b190 a2=0 a3=7fff7989b17c items=0 ppid=2291 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:06:36.478000 audit[2361]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.478000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf3d2e4e0 a2=0 a3=7ffcf3d2e4cc items=0 ppid=2291 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:06:36.479000 audit[2362]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.479000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc22ab230 a2=0 a3=7fffc22ab21c items=0 ppid=2291 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:06:36.481000 audit[2364]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.481000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff32486950 a2=0 a3=7fff3248693c items=0 ppid=2291 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:06:36.485000 audit[2367]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.485000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffef35c58c0 a2=0 a3=7ffef35c58ac items=0 ppid=2291 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 22:06:36.485000 audit[2368]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.485000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8f6ea610 a2=0 a3=7ffd8f6ea5fc items=0 ppid=2291 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:06:36.487000 audit[2370]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.487000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4953dd60 a2=0 a3=7fff4953dd4c items=0 ppid=2291 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:06:36.488000 audit[2371]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.488000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeef864290 a2=0 a3=7ffeef86427c items=0 ppid=2291 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:06:36.489000 audit[2373]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.489000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffceef2fe20 a2=0 a3=7ffceef2fe0c items=0 ppid=2291 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:06:36.491000 audit[2376]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.491000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6e686550 a2=0 a3=7ffc6e68653c items=0 ppid=2291 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:06:36.494000 audit[2379]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.494000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe19a55a0 a2=0 a3=7fffe19a558c items=0 ppid=2291 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:06:36.494000 audit[2380]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.494000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff0ba7100 a2=0 a3=7ffff0ba70ec items=0 ppid=2291 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:06:36.496000 audit[2382]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.496000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd241a3450 a2=0 a3=7ffd241a343c items=0 ppid=2291 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:06:36.498000 audit[2385]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.498000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0522db80 a2=0 a3=7ffd0522db6c items=0 ppid=2291 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:06:36.499000 audit[2386]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.499000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff27ae8700 a2=0 a3=7fff27ae86ec items=0 ppid=2291 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:06:36.500000 audit[2388]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:06:36.500000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd402f47a0 a2=0 a3=7ffd402f478c items=0 ppid=2291 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:06:36.515000 audit[2394]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:36.515000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff88004ba0 a2=0 a3=7fff88004b8c items=0 ppid=2291 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:36.520000 audit[2394]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:36.520000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff88004ba0 a2=0 a3=7fff88004b8c items=0 ppid=2291 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:36.521000 audit[2399]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.521000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3ccf63c0 a2=0 a3=7ffc3ccf63ac items=0 ppid=2291 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:06:36.523000 audit[2401]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.523000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3b148b20 a2=0 a3=7ffe3b148b0c items=0 ppid=2291 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:06:36.525000 audit[2404]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.525000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd6f62470 a2=0 a3=7ffdd6f6245c items=0 ppid=2291 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:06:36.525000 audit[2405]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.525000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe66d8a480 a2=0 a3=7ffe66d8a46c items=0 ppid=2291 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:06:36.527000 audit[2407]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.527000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc74345570 a2=0 a3=7ffc7434555c items=0 ppid=2291 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:06:36.527000 audit[2408]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.527000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3d486360 a2=0 a3=7ffe3d48634c items=0 ppid=2291 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:06:36.529000 audit[2410]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.529000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd90d50d80 a2=0 a3=7ffd90d50d6c items=0 ppid=2291 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 22:06:36.531000 audit[2413]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.531000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdd4cc0f40 a2=0 a3=7ffdd4cc0f2c items=0 ppid=2291 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:06:36.532000 audit[2414]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.532000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffbc8e100 a2=0 a3=7ffffbc8e0ec items=0 ppid=2291 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:06:36.533000 audit[2416]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.533000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4aaf2230 a2=0 a3=7ffe4aaf221c items=0 ppid=2291 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:06:36.534000 audit[2417]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.534000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffec016870 a2=0 a3=7fffec01685c items=0 ppid=2291 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:06:36.535000 audit[2419]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.535000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2dc710b0 a2=0 a3=7ffe2dc7109c items=0 ppid=2291 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:06:36.537000 audit[2422]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.537000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffdaf89a0 a2=0 a3=7ffffdaf898c items=0 ppid=2291 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:06:36.540000 audit[2425]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.540000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdac123280 a2=0 a3=7ffdac12326c items=0 ppid=2291 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 22:06:36.540000 audit[2426]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.540000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcfbc2f450 a2=0 a3=7ffcfbc2f43c items=0 ppid=2291 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:06:36.542000 audit[2428]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.542000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc50769a0 a2=0 a3=7ffdc507698c items=0 ppid=2291 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:06:36.544000 audit[2431]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.544000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe12120bb0 a2=0 a3=7ffe12120b9c items=0 ppid=2291 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:06:36.544000 audit[2432]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.544000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc97421660 a2=0 a3=7ffc9742164c items=0 ppid=2291 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:06:36.546000 audit[2434]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.546000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0c374f80 a2=0 a3=7ffd0c374f6c items=0 ppid=2291 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:06:36.546000 audit[2435]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.546000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9d0a39b0 a2=0 a3=7ffe9d0a399c items=0 ppid=2291 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:06:36.548000 audit[2437]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.548000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf9e478c0 a2=0 a3=7ffdf9e478ac items=0 ppid=2291 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:06:36.550000 audit[2440]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:06:36.550000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1e5b65c0 a2=0 a3=7fff1e5b65ac items=0 ppid=2291 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:06:36.552000 audit[2442]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:06:36.552000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe0f00e040 a2=0 a3=7ffe0f00e02c items=0 ppid=2291 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.552000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:36.552000 audit[2442]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:06:36.552000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe0f00e040 a2=0 a3=7ffe0f00e02c items=0 ppid=2291 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:36.552000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:36.957532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount267061902.mount: Deactivated successfully. Feb 12 22:06:37.750263 env[1153]: time="2024-02-12T22:06:37.750232207Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:37.751389 env[1153]: time="2024-02-12T22:06:37.751376885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:37.752647 env[1153]: time="2024-02-12T22:06:37.752635697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:37.753731 env[1153]: time="2024-02-12T22:06:37.753719076Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:37.754167 env[1153]: time="2024-02-12T22:06:37.754152677Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 22:06:37.755958 env[1153]: time="2024-02-12T22:06:37.755837349Z" level=info msg="CreateContainer within sandbox \"910724dd274a17ac49cb9683cd43ad3ae890c5798058b9ed3482c093fa4fd5a3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 22:06:37.775462 env[1153]: time="2024-02-12T22:06:37.775437641Z" level=info msg="CreateContainer within sandbox \"910724dd274a17ac49cb9683cd43ad3ae890c5798058b9ed3482c093fa4fd5a3\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"975051df8c07403100e802183ccf07a2e2fd26a74db6ccb767238d5ec1778e2b\"" Feb 12 22:06:37.776218 env[1153]: time="2024-02-12T22:06:37.775806039Z" level=info msg="StartContainer for \"975051df8c07403100e802183ccf07a2e2fd26a74db6ccb767238d5ec1778e2b\"" Feb 12 22:06:37.792360 systemd[1]: Started cri-containerd-975051df8c07403100e802183ccf07a2e2fd26a74db6ccb767238d5ec1778e2b.scope. Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.801000 audit: BPF prog-id=123 op=LOAD Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2256 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353035316466386330373430333130306538303231383363636630 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2256 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353035316466386330373430333130306538303231383363636630 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit: BPF prog-id=124 op=LOAD Feb 12 22:06:37.802000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030c370 items=0 ppid=2256 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353035316466386330373430333130306538303231383363636630 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.802000 audit: BPF prog-id=125 op=LOAD Feb 12 22:06:37.802000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030c3b8 items=0 ppid=2256 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353035316466386330373430333130306538303231383363636630 Feb 12 22:06:37.803000 audit: BPF prog-id=125 op=UNLOAD Feb 12 22:06:37.803000 audit: BPF prog-id=124 op=UNLOAD Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:37.803000 audit: BPF prog-id=126 op=LOAD Feb 12 22:06:37.803000 audit[2451]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030c7c8 items=0 ppid=2256 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:37.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353035316466386330373430333130306538303231383363636630 Feb 12 22:06:37.813207 env[1153]: time="2024-02-12T22:06:37.812490989Z" level=info msg="StartContainer for \"975051df8c07403100e802183ccf07a2e2fd26a74db6ccb767238d5ec1778e2b\" returns successfully" Feb 12 22:06:38.091504 kubelet[2131]: I0212 22:06:38.091480 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-49f7p" podStartSLOduration=3.091447184 podCreationTimestamp="2024-02-12 22:06:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:06:36.089442002 +0000 UTC m=+16.162385755" watchObservedRunningTime="2024-02-12 22:06:38.091447184 +0000 UTC m=+18.164390933" Feb 12 22:06:39.409000 audit[2481]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:39.409000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd3cdd4bd0 a2=0 a3=7ffd3cdd4bbc items=0 ppid=2291 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:39.409000 audit[2481]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:39.409000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd3cdd4bd0 a2=0 a3=31030 items=0 ppid=2291 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:39.417000 audit[2483]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:39.417000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc5b6b7720 a2=0 a3=7ffc5b6b770c items=0 ppid=2291 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:39.419000 audit[2483]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:39.419000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc5b6b7720 a2=0 a3=31030 items=0 ppid=2291 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:39.523570 kubelet[2131]: I0212 22:06:39.523554 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-7lz6n" podStartSLOduration=2.619409346 podCreationTimestamp="2024-02-12 22:06:35 +0000 UTC" firstStartedPulling="2024-02-12 22:06:35.850630866 +0000 UTC m=+15.923574609" lastFinishedPulling="2024-02-12 22:06:37.754752087 +0000 UTC m=+17.827695833" observedRunningTime="2024-02-12 22:06:38.09243974 +0000 UTC m=+18.165383490" watchObservedRunningTime="2024-02-12 22:06:39.52353057 +0000 UTC m=+19.596474319" Feb 12 22:06:39.523877 kubelet[2131]: I0212 22:06:39.523867 2131 topology_manager.go:215] "Topology Admit Handler" podUID="c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" podNamespace="calico-system" podName="calico-typha-86dcc84966-czgf7" Feb 12 22:06:39.526706 systemd[1]: Created slice kubepods-besteffort-podc6f8e870_ff6c_408f_a44a_bb4bcbf5f531.slice. Feb 12 22:06:39.582118 kubelet[2131]: I0212 22:06:39.582099 2131 topology_manager.go:215] "Topology Admit Handler" podUID="b9b0fe7d-df75-4059-811a-13ef2b6d452a" podNamespace="calico-system" podName="calico-node-x884f" Feb 12 22:06:39.585113 systemd[1]: Created slice kubepods-besteffort-podb9b0fe7d_df75_4059_811a_13ef2b6d452a.slice. Feb 12 22:06:39.697778 kubelet[2131]: I0212 22:06:39.697705 2131 topology_manager.go:215] "Topology Admit Handler" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" podNamespace="calico-system" podName="csi-node-driver-ssbfr" Feb 12 22:06:39.698412 kubelet[2131]: E0212 22:06:39.697891 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:39.703049 kubelet[2131]: I0212 22:06:39.703019 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9b0fe7d-df75-4059-811a-13ef2b6d452a-tigera-ca-bundle\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703049 kubelet[2131]: I0212 22:06:39.703048 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-net-dir\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703049 kubelet[2131]: I0212 22:06:39.703064 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-xtables-lock\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703236 kubelet[2131]: I0212 22:06:39.703075 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-log-dir\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703236 kubelet[2131]: I0212 22:06:39.703090 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-policysync\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703236 kubelet[2131]: I0212 22:06:39.703104 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-lib-modules\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703236 kubelet[2131]: I0212 22:06:39.703116 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d6q2m\" (UniqueName: \"kubernetes.io/projected/b9b0fe7d-df75-4059-811a-13ef2b6d452a-kube-api-access-d6q2m\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703236 kubelet[2131]: I0212 22:06:39.703138 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-flexvol-driver-host\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703339 kubelet[2131]: I0212 22:06:39.703154 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xj6q8\" (UniqueName: \"kubernetes.io/projected/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-kube-api-access-xj6q8\") pod \"calico-typha-86dcc84966-czgf7\" (UID: \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\") " pod="calico-system/calico-typha-86dcc84966-czgf7" Feb 12 22:06:39.703339 kubelet[2131]: I0212 22:06:39.703166 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-lib-calico\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703339 kubelet[2131]: I0212 22:06:39.703189 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-bin-dir\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703339 kubelet[2131]: I0212 22:06:39.703204 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b9b0fe7d-df75-4059-811a-13ef2b6d452a-node-certs\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703339 kubelet[2131]: I0212 22:06:39.703218 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-run-calico\") pod \"calico-node-x884f\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " pod="calico-system/calico-node-x884f" Feb 12 22:06:39.703436 kubelet[2131]: I0212 22:06:39.703231 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-tigera-ca-bundle\") pod \"calico-typha-86dcc84966-czgf7\" (UID: \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\") " pod="calico-system/calico-typha-86dcc84966-czgf7" Feb 12 22:06:39.703436 kubelet[2131]: I0212 22:06:39.703243 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-typha-certs\") pod \"calico-typha-86dcc84966-czgf7\" (UID: \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\") " pod="calico-system/calico-typha-86dcc84966-czgf7" Feb 12 22:06:39.804858 kubelet[2131]: I0212 22:06:39.804832 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c4db62a6-5db0-4596-b7c7-a5483034a42b-varrun\") pod \"csi-node-driver-ssbfr\" (UID: \"c4db62a6-5db0-4596-b7c7-a5483034a42b\") " pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:39.805078 kubelet[2131]: I0212 22:06:39.805064 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c4db62a6-5db0-4596-b7c7-a5483034a42b-kubelet-dir\") pod \"csi-node-driver-ssbfr\" (UID: \"c4db62a6-5db0-4596-b7c7-a5483034a42b\") " pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:39.805161 kubelet[2131]: I0212 22:06:39.805153 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c4db62a6-5db0-4596-b7c7-a5483034a42b-socket-dir\") pod \"csi-node-driver-ssbfr\" (UID: \"c4db62a6-5db0-4596-b7c7-a5483034a42b\") " pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:39.805242 kubelet[2131]: I0212 22:06:39.805235 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c4db62a6-5db0-4596-b7c7-a5483034a42b-registration-dir\") pod \"csi-node-driver-ssbfr\" (UID: \"c4db62a6-5db0-4596-b7c7-a5483034a42b\") " pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:39.805309 kubelet[2131]: I0212 22:06:39.805302 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q94db\" (UniqueName: \"kubernetes.io/projected/c4db62a6-5db0-4596-b7c7-a5483034a42b-kube-api-access-q94db\") pod \"csi-node-driver-ssbfr\" (UID: \"c4db62a6-5db0-4596-b7c7-a5483034a42b\") " pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:39.810650 kubelet[2131]: E0212 22:06:39.810490 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.810650 kubelet[2131]: W0212 22:06:39.810509 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.810650 kubelet[2131]: E0212 22:06:39.810542 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.810988 kubelet[2131]: E0212 22:06:39.810977 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.810988 kubelet[2131]: W0212 22:06:39.810987 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.811077 kubelet[2131]: E0212 22:06:39.811068 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.811233 kubelet[2131]: E0212 22:06:39.811220 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.811233 kubelet[2131]: W0212 22:06:39.811227 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.811284 kubelet[2131]: E0212 22:06:39.811271 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.811365 kubelet[2131]: E0212 22:06:39.811357 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.811365 kubelet[2131]: W0212 22:06:39.811362 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.811426 kubelet[2131]: E0212 22:06:39.811409 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.811508 kubelet[2131]: E0212 22:06:39.811501 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.811508 kubelet[2131]: W0212 22:06:39.811506 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.811563 kubelet[2131]: E0212 22:06:39.811515 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.811649 kubelet[2131]: E0212 22:06:39.811641 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.811649 kubelet[2131]: W0212 22:06:39.811647 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.811707 kubelet[2131]: E0212 22:06:39.811655 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.817290 kubelet[2131]: E0212 22:06:39.817270 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.817290 kubelet[2131]: W0212 22:06:39.817284 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.817433 kubelet[2131]: E0212 22:06:39.817309 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.818281 kubelet[2131]: E0212 22:06:39.818254 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.818281 kubelet[2131]: W0212 22:06:39.818264 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.818281 kubelet[2131]: E0212 22:06:39.818280 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.819399 kubelet[2131]: E0212 22:06:39.819387 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.819399 kubelet[2131]: W0212 22:06:39.819397 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.819460 kubelet[2131]: E0212 22:06:39.819410 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.819738 kubelet[2131]: E0212 22:06:39.819729 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.819738 kubelet[2131]: W0212 22:06:39.819736 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.819794 kubelet[2131]: E0212 22:06:39.819745 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.821129 kubelet[2131]: E0212 22:06:39.821110 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.821129 kubelet[2131]: W0212 22:06:39.821120 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.821245 kubelet[2131]: E0212 22:06:39.821212 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.821245 kubelet[2131]: W0212 22:06:39.821217 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.821245 kubelet[2131]: E0212 22:06:39.821226 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.821245 kubelet[2131]: E0212 22:06:39.821237 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.821378 kubelet[2131]: E0212 22:06:39.821363 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.821378 kubelet[2131]: W0212 22:06:39.821370 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.821378 kubelet[2131]: E0212 22:06:39.821376 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.825034 kubelet[2131]: E0212 22:06:39.824998 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.825034 kubelet[2131]: W0212 22:06:39.825018 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.825247 kubelet[2131]: E0212 22:06:39.825047 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.830431 kubelet[2131]: E0212 22:06:39.830409 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.830431 kubelet[2131]: W0212 22:06:39.830422 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.830431 kubelet[2131]: E0212 22:06:39.830435 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.887140 env[1153]: time="2024-02-12T22:06:39.887109611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x884f,Uid:b9b0fe7d-df75-4059-811a-13ef2b6d452a,Namespace:calico-system,Attempt:0,}" Feb 12 22:06:39.899201 env[1153]: time="2024-02-12T22:06:39.897229139Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:39.899201 env[1153]: time="2024-02-12T22:06:39.897260446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:39.899201 env[1153]: time="2024-02-12T22:06:39.897267758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:39.899344 env[1153]: time="2024-02-12T22:06:39.899238432Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57 pid=2510 runtime=io.containerd.runc.v2 Feb 12 22:06:39.906620 kubelet[2131]: E0212 22:06:39.906603 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.906620 kubelet[2131]: W0212 22:06:39.906614 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.906778 kubelet[2131]: E0212 22:06:39.906630 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.906778 kubelet[2131]: E0212 22:06:39.906727 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.906778 kubelet[2131]: W0212 22:06:39.906732 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.906778 kubelet[2131]: E0212 22:06:39.906744 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.906861 kubelet[2131]: E0212 22:06:39.906824 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.906861 kubelet[2131]: W0212 22:06:39.906829 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.906861 kubelet[2131]: E0212 22:06:39.906840 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.906927 kubelet[2131]: E0212 22:06:39.906916 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.906927 kubelet[2131]: W0212 22:06:39.906922 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.906972 kubelet[2131]: E0212 22:06:39.906929 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.907060 kubelet[2131]: E0212 22:06:39.907049 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.907060 kubelet[2131]: W0212 22:06:39.907055 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.907060 kubelet[2131]: E0212 22:06:39.907061 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.907155 kubelet[2131]: E0212 22:06:39.907145 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.907155 kubelet[2131]: W0212 22:06:39.907152 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.907224 kubelet[2131]: E0212 22:06:39.907161 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.907465 kubelet[2131]: E0212 22:06:39.907455 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.907465 kubelet[2131]: W0212 22:06:39.907461 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.907525 kubelet[2131]: E0212 22:06:39.907470 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.907549 kubelet[2131]: E0212 22:06:39.907543 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.907549 kubelet[2131]: W0212 22:06:39.907547 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.907587 kubelet[2131]: E0212 22:06:39.907553 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.907659 kubelet[2131]: E0212 22:06:39.907647 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.907659 kubelet[2131]: W0212 22:06:39.907653 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.907719 kubelet[2131]: E0212 22:06:39.907662 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.907921 kubelet[2131]: E0212 22:06:39.907893 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.907921 kubelet[2131]: W0212 22:06:39.907900 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.907921 kubelet[2131]: E0212 22:06:39.907911 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908004 kubelet[2131]: E0212 22:06:39.907984 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908004 kubelet[2131]: W0212 22:06:39.907988 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908004 kubelet[2131]: E0212 22:06:39.907994 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908077 kubelet[2131]: E0212 22:06:39.908067 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908077 kubelet[2131]: W0212 22:06:39.908073 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908136 kubelet[2131]: E0212 22:06:39.908083 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908191 kubelet[2131]: E0212 22:06:39.908182 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908191 kubelet[2131]: W0212 22:06:39.908188 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908241 kubelet[2131]: E0212 22:06:39.908194 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908282 kubelet[2131]: E0212 22:06:39.908266 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908282 kubelet[2131]: W0212 22:06:39.908270 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908282 kubelet[2131]: E0212 22:06:39.908278 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908354 kubelet[2131]: E0212 22:06:39.908345 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908354 kubelet[2131]: W0212 22:06:39.908352 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908406 kubelet[2131]: E0212 22:06:39.908363 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908465 kubelet[2131]: E0212 22:06:39.908432 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908465 kubelet[2131]: W0212 22:06:39.908435 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908513 kubelet[2131]: E0212 22:06:39.908469 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908534 kubelet[2131]: E0212 22:06:39.908521 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908534 kubelet[2131]: W0212 22:06:39.908524 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908576 kubelet[2131]: E0212 22:06:39.908557 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908609 kubelet[2131]: E0212 22:06:39.908600 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908609 kubelet[2131]: W0212 22:06:39.908605 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908659 kubelet[2131]: E0212 22:06:39.908645 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908691 kubelet[2131]: E0212 22:06:39.908688 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908713 kubelet[2131]: W0212 22:06:39.908692 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908713 kubelet[2131]: E0212 22:06:39.908699 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908798 kubelet[2131]: E0212 22:06:39.908768 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908798 kubelet[2131]: W0212 22:06:39.908795 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908858 kubelet[2131]: E0212 22:06:39.908803 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.908879 kubelet[2131]: E0212 22:06:39.908869 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.908879 kubelet[2131]: W0212 22:06:39.908873 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.908879 kubelet[2131]: E0212 22:06:39.908878 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.909036 kubelet[2131]: E0212 22:06:39.909025 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.909078 kubelet[2131]: W0212 22:06:39.909049 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.909078 kubelet[2131]: E0212 22:06:39.909070 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.909359 kubelet[2131]: E0212 22:06:39.909349 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.909359 kubelet[2131]: W0212 22:06:39.909355 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.909419 kubelet[2131]: E0212 22:06:39.909364 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.909461 kubelet[2131]: E0212 22:06:39.909450 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.909461 kubelet[2131]: W0212 22:06:39.909456 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.909461 kubelet[2131]: E0212 22:06:39.909462 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.909555 kubelet[2131]: E0212 22:06:39.909545 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.909555 kubelet[2131]: W0212 22:06:39.909552 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.909614 kubelet[2131]: E0212 22:06:39.909561 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.913056 systemd[1]: Started cri-containerd-0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57.scope. Feb 12 22:06:39.920904 kubelet[2131]: E0212 22:06:39.920890 2131 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:06:39.920999 kubelet[2131]: W0212 22:06:39.920989 2131 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:06:39.921082 kubelet[2131]: E0212 22:06:39.921074 2131 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:06:39.946581 kernel: kauditd_printk_skb: 381 callbacks suppressed Feb 12 22:06:39.946663 kernel: audit: type=1400 audit(1707775599.940:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946688 kernel: audit: type=1400 audit(1707775599.940:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.949269 kernel: audit: type=1400 audit(1707775599.940:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.955195 kernel: audit: type=1400 audit(1707775599.940:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.955248 kernel: audit: type=1400 audit(1707775599.940:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.960292 kernel: audit: type=1400 audit(1707775599.940:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.960328 kernel: audit: type=1400 audit(1707775599.940:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.960345 kernel: audit: type=1400 audit(1707775599.940:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.965141 kernel: audit: type=1400 audit(1707775599.940:1069): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.940000 audit: BPF prog-id=127 op=LOAD Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.970260 kernel: audit: type=1400 audit(1707775599.940:1070): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656439663036353031633139366666323238326261343936383632 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656439663036353031633139366666323238326261343936383632 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.944000 audit: BPF prog-id=128 op=LOAD Feb 12 22:06:39.944000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002aab80 items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656439663036353031633139366666323238326261343936383632 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit: BPF prog-id=129 op=LOAD Feb 12 22:06:39.946000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002aabc8 items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656439663036353031633139366666323238326261343936383632 Feb 12 22:06:39.946000 audit: BPF prog-id=129 op=UNLOAD Feb 12 22:06:39.946000 audit: BPF prog-id=128 op=UNLOAD Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:39.946000 audit: BPF prog-id=130 op=LOAD Feb 12 22:06:39.946000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002aafd8 items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:39.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656439663036353031633139366666323238326261343936383632 Feb 12 22:06:39.975079 env[1153]: time="2024-02-12T22:06:39.975049879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x884f,Uid:b9b0fe7d-df75-4059-811a-13ef2b6d452a,Namespace:calico-system,Attempt:0,} returns sandbox id \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\"" Feb 12 22:06:39.975846 env[1153]: time="2024-02-12T22:06:39.975824465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 22:06:40.117463 env[1153]: time="2024-02-12T22:06:40.117431494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-86dcc84966-czgf7,Uid:c6f8e870-ff6c-408f-a44a-bb4bcbf5f531,Namespace:calico-system,Attempt:0,}" Feb 12 22:06:40.260159 env[1153]: time="2024-02-12T22:06:40.258900257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:40.260953 env[1153]: time="2024-02-12T22:06:40.260302582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:40.260953 env[1153]: time="2024-02-12T22:06:40.260347509Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:40.260953 env[1153]: time="2024-02-12T22:06:40.260448568Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e pid=2578 runtime=io.containerd.runc.v2 Feb 12 22:06:40.268725 systemd[1]: Started cri-containerd-47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e.scope. Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit: BPF prog-id=131 op=LOAD Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2578 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663665393163646633393439613231646666343966326633326434 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2578 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663665393163646633393439613231646666343966326633326434 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit: BPF prog-id=132 op=LOAD Feb 12 22:06:40.293000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd10 items=0 ppid=2578 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663665393163646633393439613231646666343966326633326434 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit: BPF prog-id=133 op=LOAD Feb 12 22:06:40.293000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd58 items=0 ppid=2578 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663665393163646633393439613231646666343966326633326434 Feb 12 22:06:40.293000 audit: BPF prog-id=133 op=UNLOAD Feb 12 22:06:40.293000 audit: BPF prog-id=132 op=UNLOAD Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:40.293000 audit: BPF prog-id=134 op=LOAD Feb 12 22:06:40.293000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ae168 items=0 ppid=2578 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663665393163646633393439613231646666343966326633326434 Feb 12 22:06:40.315237 env[1153]: time="2024-02-12T22:06:40.315184287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-86dcc84966-czgf7,Uid:c6f8e870-ff6c-408f-a44a-bb4bcbf5f531,Namespace:calico-system,Attempt:0,} returns sandbox id \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\"" Feb 12 22:06:40.425000 audit[2613]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:40.425000 audit[2613]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe02336680 a2=0 a3=7ffe0233666c items=0 ppid=2291 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:40.426000 audit[2613]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:40.426000 audit[2613]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe02336680 a2=0 a3=31030 items=0 ppid=2291 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:40.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:40.997003 kubelet[2131]: E0212 22:06:40.996977 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:42.767574 env[1153]: time="2024-02-12T22:06:42.767540587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:42.772241 env[1153]: time="2024-02-12T22:06:42.772214649Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:42.773905 env[1153]: time="2024-02-12T22:06:42.773883149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:42.775481 env[1153]: time="2024-02-12T22:06:42.775462048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:42.776125 env[1153]: time="2024-02-12T22:06:42.776100056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 22:06:42.777760 env[1153]: time="2024-02-12T22:06:42.777742860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 22:06:42.778707 env[1153]: time="2024-02-12T22:06:42.778678647Z" level=info msg="CreateContainer within sandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:06:42.786049 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2745299808.mount: Deactivated successfully. Feb 12 22:06:42.805017 env[1153]: time="2024-02-12T22:06:42.804985634Z" level=info msg="CreateContainer within sandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4\"" Feb 12 22:06:42.805403 env[1153]: time="2024-02-12T22:06:42.805381810Z" level=info msg="StartContainer for \"83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4\"" Feb 12 22:06:42.824095 systemd[1]: Started cri-containerd-83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4.scope. Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3a91e16e78 items=0 ppid=2510 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:42.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833626233663430323933303434393564626336333037623338383233 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit: BPF prog-id=135 op=LOAD Feb 12 22:06:42.833000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000277c58 items=0 ppid=2510 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:42.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833626233663430323933303434393564626336333037623338383233 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit: BPF prog-id=136 op=LOAD Feb 12 22:06:42.833000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000277ca8 items=0 ppid=2510 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:42.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833626233663430323933303434393564626336333037623338383233 Feb 12 22:06:42.833000 audit: BPF prog-id=136 op=UNLOAD Feb 12 22:06:42.833000 audit: BPF prog-id=135 op=UNLOAD Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:42.833000 audit: BPF prog-id=137 op=LOAD Feb 12 22:06:42.833000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000277d38 items=0 ppid=2510 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:42.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833626233663430323933303434393564626336333037623338383233 Feb 12 22:06:42.845188 env[1153]: time="2024-02-12T22:06:42.845141739Z" level=info msg="StartContainer for \"83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4\" returns successfully" Feb 12 22:06:42.849383 systemd[1]: cri-containerd-83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4.scope: Deactivated successfully. Feb 12 22:06:42.853000 audit: BPF prog-id=137 op=UNLOAD Feb 12 22:06:42.863146 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4-rootfs.mount: Deactivated successfully. Feb 12 22:06:42.992816 env[1153]: time="2024-02-12T22:06:42.992788514Z" level=info msg="shim disconnected" id=83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4 Feb 12 22:06:42.993023 env[1153]: time="2024-02-12T22:06:42.993012347Z" level=warning msg="cleaning up after shim disconnected" id=83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4 namespace=k8s.io Feb 12 22:06:42.993076 env[1153]: time="2024-02-12T22:06:42.993066815Z" level=info msg="cleaning up dead shim" Feb 12 22:06:42.997790 kubelet[2131]: E0212 22:06:42.997775 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:42.998385 env[1153]: time="2024-02-12T22:06:42.998370721Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:06:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2659 runtime=io.containerd.runc.v2\n" Feb 12 22:06:43.098712 env[1153]: time="2024-02-12T22:06:43.098685037Z" level=info msg="StopPodSandbox for \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\"" Feb 12 22:06:43.098836 env[1153]: time="2024-02-12T22:06:43.098734469Z" level=info msg="Container to stop \"83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 22:06:43.104000 audit: BPF prog-id=127 op=UNLOAD Feb 12 22:06:43.104454 systemd[1]: cri-containerd-0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57.scope: Deactivated successfully. Feb 12 22:06:43.108000 audit: BPF prog-id=130 op=UNLOAD Feb 12 22:06:43.139884 env[1153]: time="2024-02-12T22:06:43.139841267Z" level=info msg="shim disconnected" id=0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57 Feb 12 22:06:43.139884 env[1153]: time="2024-02-12T22:06:43.139879489Z" level=warning msg="cleaning up after shim disconnected" id=0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57 namespace=k8s.io Feb 12 22:06:43.139884 env[1153]: time="2024-02-12T22:06:43.139886968Z" level=info msg="cleaning up dead shim" Feb 12 22:06:43.145866 env[1153]: time="2024-02-12T22:06:43.145829500Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:06:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2690 runtime=io.containerd.runc.v2\n" Feb 12 22:06:43.146068 env[1153]: time="2024-02-12T22:06:43.146046088Z" level=info msg="TearDown network for sandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" successfully" Feb 12 22:06:43.146068 env[1153]: time="2024-02-12T22:06:43.146065975Z" level=info msg="StopPodSandbox for \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" returns successfully" Feb 12 22:06:43.355455 kubelet[2131]: I0212 22:06:43.355389 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-flexvol-driver-host\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.355596 kubelet[2131]: I0212 22:06:43.355587 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b9b0fe7d-df75-4059-811a-13ef2b6d452a-node-certs\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.355665 kubelet[2131]: I0212 22:06:43.355657 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-d6q2m\" (UniqueName: \"kubernetes.io/projected/b9b0fe7d-df75-4059-811a-13ef2b6d452a-kube-api-access-d6q2m\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.355791 kubelet[2131]: I0212 22:06:43.355783 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-bin-dir\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.355845 kubelet[2131]: I0212 22:06:43.355838 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-run-calico\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.355897 kubelet[2131]: I0212 22:06:43.355890 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-lib-modules\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.355959 kubelet[2131]: I0212 22:06:43.355952 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9b0fe7d-df75-4059-811a-13ef2b6d452a-tigera-ca-bundle\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.356027 kubelet[2131]: I0212 22:06:43.356020 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-lib-calico\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.356086 kubelet[2131]: I0212 22:06:43.356079 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-xtables-lock\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.356141 kubelet[2131]: I0212 22:06:43.356134 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-net-dir\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.356201 kubelet[2131]: I0212 22:06:43.356194 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-log-dir\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.356257 kubelet[2131]: I0212 22:06:43.356250 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-policysync\") pod \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\" (UID: \"b9b0fe7d-df75-4059-811a-13ef2b6d452a\") " Feb 12 22:06:43.356368 kubelet[2131]: I0212 22:06:43.356356 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-policysync" (OuterVolumeSpecName: "policysync") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.356844 kubelet[2131]: I0212 22:06:43.356436 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.356904 kubelet[2131]: I0212 22:06:43.356446 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.356957 kubelet[2131]: I0212 22:06:43.356459 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.357010 kubelet[2131]: I0212 22:06:43.356659 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/b9b0fe7d-df75-4059-811a-13ef2b6d452a-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 22:06:43.357075 kubelet[2131]: I0212 22:06:43.356671 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.357124 kubelet[2131]: I0212 22:06:43.356680 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.357200 kubelet[2131]: I0212 22:06:43.356688 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.357270 kubelet[2131]: I0212 22:06:43.356696 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.357369 kubelet[2131]: I0212 22:06:43.356703 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 22:06:43.358990 kubelet[2131]: I0212 22:06:43.358973 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/b9b0fe7d-df75-4059-811a-13ef2b6d452a-kube-api-access-d6q2m" (OuterVolumeSpecName: "kube-api-access-d6q2m") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "kube-api-access-d6q2m". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 22:06:43.360054 kubelet[2131]: I0212 22:06:43.360038 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/b9b0fe7d-df75-4059-811a-13ef2b6d452a-node-certs" (OuterVolumeSpecName: "node-certs") pod "b9b0fe7d-df75-4059-811a-13ef2b6d452a" (UID: "b9b0fe7d-df75-4059-811a-13ef2b6d452a"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 22:06:43.456959 kubelet[2131]: I0212 22:06:43.456929 2131 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-net-dir\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.456959 kubelet[2131]: I0212 22:06:43.456952 2131 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-log-dir\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.456959 kubelet[2131]: I0212 22:06:43.456959 2131 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-policysync\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.456959 kubelet[2131]: I0212 22:06:43.456965 2131 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.456971 2131 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b9b0fe7d-df75-4059-811a-13ef2b6d452a-node-certs\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.456976 2131 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-lib-modules\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.456983 2131 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-d6q2m\" (UniqueName: \"kubernetes.io/projected/b9b0fe7d-df75-4059-811a-13ef2b6d452a-kube-api-access-d6q2m\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.456992 2131 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.456997 2131 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-run-calico\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.457002 2131 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.457008 2131 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9b0fe7d-df75-4059-811a-13ef2b6d452a-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.457128 kubelet[2131]: I0212 22:06:43.457013 2131 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b9b0fe7d-df75-4059-811a-13ef2b6d452a-xtables-lock\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:43.784602 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57-rootfs.mount: Deactivated successfully. Feb 12 22:06:43.784688 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57-shm.mount: Deactivated successfully. Feb 12 22:06:43.784736 systemd[1]: var-lib-kubelet-pods-b9b0fe7d\x2ddf75\x2d4059\x2d811a\x2d13ef2b6d452a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dd6q2m.mount: Deactivated successfully. Feb 12 22:06:43.784774 systemd[1]: var-lib-kubelet-pods-b9b0fe7d\x2ddf75\x2d4059\x2d811a\x2d13ef2b6d452a-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 12 22:06:44.000721 systemd[1]: Removed slice kubepods-besteffort-podb9b0fe7d_df75_4059_811a_13ef2b6d452a.slice. Feb 12 22:06:44.100573 kubelet[2131]: I0212 22:06:44.100556 2131 scope.go:117] "RemoveContainer" containerID="83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4" Feb 12 22:06:44.101726 env[1153]: time="2024-02-12T22:06:44.101707560Z" level=info msg="RemoveContainer for \"83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4\"" Feb 12 22:06:44.113286 env[1153]: time="2024-02-12T22:06:44.113260846Z" level=info msg="RemoveContainer for \"83bb3f4029304495dbc6307b3882306cd7eed4fe2ad8f25bbf64175273dafda4\" returns successfully" Feb 12 22:06:44.127789 kubelet[2131]: I0212 22:06:44.127755 2131 topology_manager.go:215] "Topology Admit Handler" podUID="4117d16d-0127-4d37-9808-b00cf67cb207" podNamespace="calico-system" podName="calico-node-8hcvt" Feb 12 22:06:44.127909 kubelet[2131]: E0212 22:06:44.127798 2131 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="b9b0fe7d-df75-4059-811a-13ef2b6d452a" containerName="flexvol-driver" Feb 12 22:06:44.127909 kubelet[2131]: I0212 22:06:44.127817 2131 memory_manager.go:346] "RemoveStaleState removing state" podUID="b9b0fe7d-df75-4059-811a-13ef2b6d452a" containerName="flexvol-driver" Feb 12 22:06:44.131480 systemd[1]: Created slice kubepods-besteffort-pod4117d16d_0127_4d37_9808_b00cf67cb207.slice. Feb 12 22:06:44.162790 kubelet[2131]: I0212 22:06:44.162765 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-lib-modules\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.162790 kubelet[2131]: I0212 22:06:44.162803 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-policysync\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.162933 kubelet[2131]: I0212 22:06:44.162830 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-cni-log-dir\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.162933 kubelet[2131]: I0212 22:06:44.162845 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-xtables-lock\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.162933 kubelet[2131]: I0212 22:06:44.162859 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4117d16d-0127-4d37-9808-b00cf67cb207-tigera-ca-bundle\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.162933 kubelet[2131]: I0212 22:06:44.162871 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4117d16d-0127-4d37-9808-b00cf67cb207-node-certs\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.162933 kubelet[2131]: I0212 22:06:44.162885 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-cni-bin-dir\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.163032 kubelet[2131]: I0212 22:06:44.162897 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-cni-net-dir\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.163032 kubelet[2131]: I0212 22:06:44.162908 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lk8xn\" (UniqueName: \"kubernetes.io/projected/4117d16d-0127-4d37-9808-b00cf67cb207-kube-api-access-lk8xn\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.163032 kubelet[2131]: I0212 22:06:44.162920 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-var-run-calico\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.163032 kubelet[2131]: I0212 22:06:44.162930 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-var-lib-calico\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.163032 kubelet[2131]: I0212 22:06:44.162943 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4117d16d-0127-4d37-9808-b00cf67cb207-flexvol-driver-host\") pod \"calico-node-8hcvt\" (UID: \"4117d16d-0127-4d37-9808-b00cf67cb207\") " pod="calico-system/calico-node-8hcvt" Feb 12 22:06:44.226906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1348581689.mount: Deactivated successfully. Feb 12 22:06:44.434158 env[1153]: time="2024-02-12T22:06:44.434074024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8hcvt,Uid:4117d16d-0127-4d37-9808-b00cf67cb207,Namespace:calico-system,Attempt:0,}" Feb 12 22:06:44.486346 env[1153]: time="2024-02-12T22:06:44.486033656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:44.486346 env[1153]: time="2024-02-12T22:06:44.486071168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:44.486346 env[1153]: time="2024-02-12T22:06:44.486083172Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:44.487209 env[1153]: time="2024-02-12T22:06:44.486565562Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf pid=2717 runtime=io.containerd.runc.v2 Feb 12 22:06:44.502342 systemd[1]: Started cri-containerd-54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf.scope. Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.512000 audit: BPF prog-id=138 op=LOAD Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653362396338306161386134656631303864313537356163373531 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653362396338306161386134656631303864313537356163373531 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit: BPF prog-id=139 op=LOAD Feb 12 22:06:44.513000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000330a30 items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653362396338306161386134656631303864313537356163373531 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit: BPF prog-id=140 op=LOAD Feb 12 22:06:44.513000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000330a78 items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653362396338306161386134656631303864313537356163373531 Feb 12 22:06:44.513000 audit: BPF prog-id=140 op=UNLOAD Feb 12 22:06:44.513000 audit: BPF prog-id=139 op=UNLOAD Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.513000 audit: BPF prog-id=141 op=LOAD Feb 12 22:06:44.513000 audit[2727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000330e88 items=0 ppid=2717 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653362396338306161386134656631303864313537356163373531 Feb 12 22:06:44.542595 env[1153]: time="2024-02-12T22:06:44.542569393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8hcvt,Uid:4117d16d-0127-4d37-9808-b00cf67cb207,Namespace:calico-system,Attempt:0,} returns sandbox id \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\"" Feb 12 22:06:44.545719 env[1153]: time="2024-02-12T22:06:44.545695167Z" level=info msg="CreateContainer within sandbox \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:06:44.565395 env[1153]: time="2024-02-12T22:06:44.565355019Z" level=info msg="CreateContainer within sandbox \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580\"" Feb 12 22:06:44.565972 env[1153]: time="2024-02-12T22:06:44.565954964Z" level=info msg="StartContainer for \"6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580\"" Feb 12 22:06:44.579021 systemd[1]: Started cri-containerd-6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580.scope. Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe359b53448 items=0 ppid=2717 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666266383234613963313436653162326265353562326432313735 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit: BPF prog-id=142 op=LOAD Feb 12 22:06:44.592000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00029bf88 items=0 ppid=2717 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666266383234613963313436653162326265353562326432313735 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit: BPF prog-id=143 op=LOAD Feb 12 22:06:44.592000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00029bfd8 items=0 ppid=2717 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666266383234613963313436653162326265353562326432313735 Feb 12 22:06:44.592000 audit: BPF prog-id=143 op=UNLOAD Feb 12 22:06:44.592000 audit: BPF prog-id=142 op=UNLOAD Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:44.592000 audit: BPF prog-id=144 op=LOAD Feb 12 22:06:44.592000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ec068 items=0 ppid=2717 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:44.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663666266383234613963313436653162326265353562326432313735 Feb 12 22:06:44.605676 env[1153]: time="2024-02-12T22:06:44.605632546Z" level=info msg="StartContainer for \"6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580\" returns successfully" Feb 12 22:06:44.617436 systemd[1]: cri-containerd-6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580.scope: Deactivated successfully. Feb 12 22:06:44.620000 audit: BPF prog-id=144 op=UNLOAD Feb 12 22:06:44.692695 env[1153]: time="2024-02-12T22:06:44.692629637Z" level=info msg="shim disconnected" id=6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580 Feb 12 22:06:44.692695 env[1153]: time="2024-02-12T22:06:44.692655496Z" level=warning msg="cleaning up after shim disconnected" id=6cfbf824a9c146e1b2be55b2d2175d59453dcd22c5352580ee5def88425d2580 namespace=k8s.io Feb 12 22:06:44.692695 env[1153]: time="2024-02-12T22:06:44.692661307Z" level=info msg="cleaning up dead shim" Feb 12 22:06:44.699699 env[1153]: time="2024-02-12T22:06:44.699674884Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:06:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2801 runtime=io.containerd.runc.v2\n" Feb 12 22:06:44.997886 kubelet[2131]: E0212 22:06:44.997759 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:45.998924 kubelet[2131]: I0212 22:06:45.998907 2131 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="b9b0fe7d-df75-4059-811a-13ef2b6d452a" path="/var/lib/kubelet/pods/b9b0fe7d-df75-4059-811a-13ef2b6d452a/volumes" Feb 12 22:06:46.063212 env[1153]: time="2024-02-12T22:06:46.063188782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:46.064095 env[1153]: time="2024-02-12T22:06:46.064080921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:46.065312 env[1153]: time="2024-02-12T22:06:46.065296491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:46.066611 env[1153]: time="2024-02-12T22:06:46.066594848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:46.067360 env[1153]: time="2024-02-12T22:06:46.067343874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 22:06:46.067997 env[1153]: time="2024-02-12T22:06:46.067979323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 22:06:46.077014 env[1153]: time="2024-02-12T22:06:46.076987165Z" level=info msg="CreateContainer within sandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 22:06:46.082840 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2909379629.mount: Deactivated successfully. Feb 12 22:06:46.085012 env[1153]: time="2024-02-12T22:06:46.084988702Z" level=info msg="CreateContainer within sandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\"" Feb 12 22:06:46.086297 env[1153]: time="2024-02-12T22:06:46.085352932Z" level=info msg="StartContainer for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\"" Feb 12 22:06:46.104126 systemd[1]: Started cri-containerd-e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c.scope. Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118375 kernel: kauditd_printk_skb: 257 callbacks suppressed Feb 12 22:06:46.118452 kernel: audit: type=1400 audit(1707775606.113:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.123516 kernel: audit: type=1400 audit(1707775606.113:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.123817 kernel: audit: type=1400 audit(1707775606.113:1135): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.133871 kernel: audit: type=1400 audit(1707775606.113:1136): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.133903 kernel: audit: type=1400 audit(1707775606.113:1137): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.133920 kernel: audit: type=1400 audit(1707775606.113:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.138710 kernel: audit: type=1400 audit(1707775606.113:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.138741 kernel: audit: type=1400 audit(1707775606.113:1140): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.141653 kernel: audit: type=1400 audit(1707775606.113:1141): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.146432 kernel: audit: type=1400 audit(1707775606.113:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.113000 audit: BPF prog-id=145 op=LOAD Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2578 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:46.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613837393464316533323339323336343162336662303466663030 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2578 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:46.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613837393464316533323339323336343162336662303466663030 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.115000 audit: BPF prog-id=146 op=LOAD Feb 12 22:06:46.115000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000376a00 items=0 ppid=2578 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:46.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613837393464316533323339323336343162336662303466663030 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.118000 audit: BPF prog-id=147 op=LOAD Feb 12 22:06:46.118000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000376a48 items=0 ppid=2578 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:46.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613837393464316533323339323336343162336662303466663030 Feb 12 22:06:46.120000 audit: BPF prog-id=147 op=UNLOAD Feb 12 22:06:46.120000 audit: BPF prog-id=146 op=UNLOAD Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:46.120000 audit: BPF prog-id=148 op=LOAD Feb 12 22:06:46.120000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000376e58 items=0 ppid=2578 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:46.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613837393464316533323339323336343162336662303466663030 Feb 12 22:06:46.565721 env[1153]: time="2024-02-12T22:06:46.565694035Z" level=info msg="StartContainer for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" returns successfully" Feb 12 22:06:46.997248 kubelet[2131]: E0212 22:06:46.996978 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:47.109949 env[1153]: time="2024-02-12T22:06:47.109919022Z" level=info msg="StopContainer for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" with timeout 300 (s)" Feb 12 22:06:47.110444 env[1153]: time="2024-02-12T22:06:47.110419900Z" level=info msg="Stop container \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" with signal terminated" Feb 12 22:06:47.120000 audit: BPF prog-id=145 op=UNLOAD Feb 12 22:06:47.120889 systemd[1]: cri-containerd-e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c.scope: Deactivated successfully. Feb 12 22:06:47.123420 kubelet[2131]: I0212 22:06:47.123397 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-86dcc84966-czgf7" podStartSLOduration=2.371683026 podCreationTimestamp="2024-02-12 22:06:39 +0000 UTC" firstStartedPulling="2024-02-12 22:06:40.315900122 +0000 UTC m=+20.388843865" lastFinishedPulling="2024-02-12 22:06:46.067587138 +0000 UTC m=+26.140530883" observedRunningTime="2024-02-12 22:06:47.123155516 +0000 UTC m=+27.196099265" watchObservedRunningTime="2024-02-12 22:06:47.123370044 +0000 UTC m=+27.196313800" Feb 12 22:06:47.124000 audit: BPF prog-id=148 op=UNLOAD Feb 12 22:06:47.141000 audit[2881]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:47.141000 audit[2881]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe4e724340 a2=0 a3=7ffe4e72432c items=0 ppid=2291 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:47.143497 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c-rootfs.mount: Deactivated successfully. Feb 12 22:06:47.144000 audit[2881]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:47.144000 audit[2881]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffe4e724340 a2=0 a3=7ffe4e72432c items=0 ppid=2291 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:47.180431 env[1153]: time="2024-02-12T22:06:47.180408051Z" level=info msg="shim disconnected" id=e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c Feb 12 22:06:47.180590 env[1153]: time="2024-02-12T22:06:47.180579222Z" level=warning msg="cleaning up after shim disconnected" id=e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c namespace=k8s.io Feb 12 22:06:47.180648 env[1153]: time="2024-02-12T22:06:47.180639019Z" level=info msg="cleaning up dead shim" Feb 12 22:06:47.185396 env[1153]: time="2024-02-12T22:06:47.185382684Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:06:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2882 runtime=io.containerd.runc.v2\n" Feb 12 22:06:47.198407 env[1153]: time="2024-02-12T22:06:47.198384932Z" level=info msg="StopContainer for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" returns successfully" Feb 12 22:06:47.198825 env[1153]: time="2024-02-12T22:06:47.198812120Z" level=info msg="StopPodSandbox for \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\"" Feb 12 22:06:47.198941 env[1153]: time="2024-02-12T22:06:47.198924643Z" level=info msg="Container to stop \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 22:06:47.200027 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e-shm.mount: Deactivated successfully. Feb 12 22:06:47.204311 systemd[1]: cri-containerd-47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e.scope: Deactivated successfully. Feb 12 22:06:47.204000 audit: BPF prog-id=131 op=UNLOAD Feb 12 22:06:47.208000 audit: BPF prog-id=134 op=UNLOAD Feb 12 22:06:47.215138 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e-rootfs.mount: Deactivated successfully. Feb 12 22:06:47.244134 env[1153]: time="2024-02-12T22:06:47.244102818Z" level=info msg="shim disconnected" id=47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e Feb 12 22:06:47.244326 env[1153]: time="2024-02-12T22:06:47.244301364Z" level=warning msg="cleaning up after shim disconnected" id=47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e namespace=k8s.io Feb 12 22:06:47.244326 env[1153]: time="2024-02-12T22:06:47.244320589Z" level=info msg="cleaning up dead shim" Feb 12 22:06:47.252556 env[1153]: time="2024-02-12T22:06:47.249896099Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:06:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2913 runtime=io.containerd.runc.v2\n" Feb 12 22:06:47.252723 env[1153]: time="2024-02-12T22:06:47.252705068Z" level=info msg="TearDown network for sandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" successfully" Feb 12 22:06:47.252793 env[1153]: time="2024-02-12T22:06:47.252776673Z" level=info msg="StopPodSandbox for \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" returns successfully" Feb 12 22:06:47.274188 kubelet[2131]: I0212 22:06:47.273788 2131 topology_manager.go:215] "Topology Admit Handler" podUID="02fe6f1b-2ba5-4007-87ab-0900b6c20f9b" podNamespace="calico-system" podName="calico-typha-58f5df5499-l6rwm" Feb 12 22:06:47.274188 kubelet[2131]: E0212 22:06:47.273835 2131 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" containerName="calico-typha" Feb 12 22:06:47.274188 kubelet[2131]: I0212 22:06:47.273856 2131 memory_manager.go:346] "RemoveStaleState removing state" podUID="c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" containerName="calico-typha" Feb 12 22:06:47.278890 systemd[1]: Created slice kubepods-besteffort-pod02fe6f1b_2ba5_4007_87ab_0900b6c20f9b.slice. Feb 12 22:06:47.283000 audit[2926]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:47.283000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffddbe4de50 a2=0 a3=7ffddbe4de3c items=0 ppid=2291 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:47.287455 kubelet[2131]: I0212 22:06:47.284551 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-xj6q8\" (UniqueName: \"kubernetes.io/projected/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-kube-api-access-xj6q8\") pod \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\" (UID: \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\") " Feb 12 22:06:47.287455 kubelet[2131]: I0212 22:06:47.284575 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-typha-certs\") pod \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\" (UID: \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\") " Feb 12 22:06:47.287455 kubelet[2131]: I0212 22:06:47.284588 2131 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-tigera-ca-bundle\") pod \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\" (UID: \"c6f8e870-ff6c-408f-a44a-bb4bcbf5f531\") " Feb 12 22:06:47.287108 systemd[1]: var-lib-kubelet-pods-c6f8e870\x2dff6c\x2d408f\x2da44a\x2dbb4bcbf5f531-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 12 22:06:47.288632 kubelet[2131]: I0212 22:06:47.288611 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" (UID: "c6f8e870-ff6c-408f-a44a-bb4bcbf5f531"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 22:06:47.288691 kubelet[2131]: I0212 22:06:47.288659 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" (UID: "c6f8e870-ff6c-408f-a44a-bb4bcbf5f531"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 22:06:47.290230 kubelet[2131]: I0212 22:06:47.290031 2131 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-kube-api-access-xj6q8" (OuterVolumeSpecName: "kube-api-access-xj6q8") pod "c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" (UID: "c6f8e870-ff6c-408f-a44a-bb4bcbf5f531"). InnerVolumeSpecName "kube-api-access-xj6q8". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 22:06:47.283000 audit[2926]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_unregister_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:47.283000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=2828 a0=3 a1=7ffddbe4de50 a2=0 a3=31030 items=0 ppid=2291 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:47.385183 kubelet[2131]: I0212 22:06:47.385151 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02fe6f1b-2ba5-4007-87ab-0900b6c20f9b-tigera-ca-bundle\") pod \"calico-typha-58f5df5499-l6rwm\" (UID: \"02fe6f1b-2ba5-4007-87ab-0900b6c20f9b\") " pod="calico-system/calico-typha-58f5df5499-l6rwm" Feb 12 22:06:47.385294 kubelet[2131]: I0212 22:06:47.385192 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-76qjm\" (UniqueName: \"kubernetes.io/projected/02fe6f1b-2ba5-4007-87ab-0900b6c20f9b-kube-api-access-76qjm\") pod \"calico-typha-58f5df5499-l6rwm\" (UID: \"02fe6f1b-2ba5-4007-87ab-0900b6c20f9b\") " pod="calico-system/calico-typha-58f5df5499-l6rwm" Feb 12 22:06:47.385294 kubelet[2131]: I0212 22:06:47.385211 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/02fe6f1b-2ba5-4007-87ab-0900b6c20f9b-typha-certs\") pod \"calico-typha-58f5df5499-l6rwm\" (UID: \"02fe6f1b-2ba5-4007-87ab-0900b6c20f9b\") " pod="calico-system/calico-typha-58f5df5499-l6rwm" Feb 12 22:06:47.385294 kubelet[2131]: I0212 22:06:47.385233 2131 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-xj6q8\" (UniqueName: \"kubernetes.io/projected/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-kube-api-access-xj6q8\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:47.385294 kubelet[2131]: I0212 22:06:47.385243 2131 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-typha-certs\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:47.385294 kubelet[2131]: I0212 22:06:47.385252 2131 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Feb 12 22:06:47.582371 env[1153]: time="2024-02-12T22:06:47.582349457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58f5df5499-l6rwm,Uid:02fe6f1b-2ba5-4007-87ab-0900b6c20f9b,Namespace:calico-system,Attempt:0,}" Feb 12 22:06:47.639964 env[1153]: time="2024-02-12T22:06:47.639912642Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:06:47.640120 env[1153]: time="2024-02-12T22:06:47.639949098Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:06:47.640120 env[1153]: time="2024-02-12T22:06:47.639958838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:06:47.640219 env[1153]: time="2024-02-12T22:06:47.640132009Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7dcb0da76addd606b9f86220cad71b67ec0b9ade0753fdf2d63140afe816eab1 pid=2940 runtime=io.containerd.runc.v2 Feb 12 22:06:47.648309 systemd[1]: Started cri-containerd-7dcb0da76addd606b9f86220cad71b67ec0b9ade0753fdf2d63140afe816eab1.scope. Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.659000 audit: BPF prog-id=149 op=LOAD Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2940 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636230646137366164646436303662396638363232306361643731 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2940 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636230646137366164646436303662396638363232306361643731 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.660000 audit: BPF prog-id=150 op=LOAD Feb 12 22:06:47.660000 audit[2949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003dc270 items=0 ppid=2940 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636230646137366164646436303662396638363232306361643731 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.661000 audit: BPF prog-id=151 op=LOAD Feb 12 22:06:47.661000 audit[2949]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003dc2b8 items=0 ppid=2940 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636230646137366164646436303662396638363232306361643731 Feb 12 22:06:47.661000 audit: BPF prog-id=151 op=UNLOAD Feb 12 22:06:47.661000 audit: BPF prog-id=150 op=UNLOAD Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { perfmon } for pid=2949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit[2949]: AVC avc: denied { bpf } for pid=2949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.662000 audit: BPF prog-id=152 op=LOAD Feb 12 22:06:47.662000 audit[2949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003dc6c8 items=0 ppid=2940 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636230646137366164646436303662396638363232306361643731 Feb 12 22:06:47.683705 env[1153]: time="2024-02-12T22:06:47.683678647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58f5df5499-l6rwm,Uid:02fe6f1b-2ba5-4007-87ab-0900b6c20f9b,Namespace:calico-system,Attempt:0,} returns sandbox id \"7dcb0da76addd606b9f86220cad71b67ec0b9ade0753fdf2d63140afe816eab1\"" Feb 12 22:06:47.691821 env[1153]: time="2024-02-12T22:06:47.691784159Z" level=info msg="CreateContainer within sandbox \"7dcb0da76addd606b9f86220cad71b67ec0b9ade0753fdf2d63140afe816eab1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 22:06:47.696909 env[1153]: time="2024-02-12T22:06:47.696880283Z" level=info msg="CreateContainer within sandbox \"7dcb0da76addd606b9f86220cad71b67ec0b9ade0753fdf2d63140afe816eab1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e3418b4b3fa4d2e38cd16e58b194498e6fb8f85ce4ca55c723a82c929252203e\"" Feb 12 22:06:47.698285 env[1153]: time="2024-02-12T22:06:47.698263714Z" level=info msg="StartContainer for \"e3418b4b3fa4d2e38cd16e58b194498e6fb8f85ce4ca55c723a82c929252203e\"" Feb 12 22:06:47.708966 systemd[1]: Started cri-containerd-e3418b4b3fa4d2e38cd16e58b194498e6fb8f85ce4ca55c723a82c929252203e.scope. Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit: BPF prog-id=153 op=LOAD Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2940 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533343138623462336661346432653338636431366535386231393434 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2940 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533343138623462336661346432653338636431366535386231393434 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit: BPF prog-id=154 op=LOAD Feb 12 22:06:47.721000 audit[2985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000256a0 items=0 ppid=2940 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533343138623462336661346432653338636431366535386231393434 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.721000 audit: BPF prog-id=155 op=LOAD Feb 12 22:06:47.721000 audit[2985]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000256e8 items=0 ppid=2940 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533343138623462336661346432653338636431366535386231393434 Feb 12 22:06:47.722000 audit: BPF prog-id=155 op=UNLOAD Feb 12 22:06:47.722000 audit: BPF prog-id=154 op=UNLOAD Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { perfmon } for pid=2985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit[2985]: AVC avc: denied { bpf } for pid=2985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:47.722000 audit: BPF prog-id=156 op=LOAD Feb 12 22:06:47.722000 audit[2985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025af8 items=0 ppid=2940 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:47.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533343138623462336661346432653338636431366535386231393434 Feb 12 22:06:47.745958 env[1153]: time="2024-02-12T22:06:47.745929660Z" level=info msg="StartContainer for \"e3418b4b3fa4d2e38cd16e58b194498e6fb8f85ce4ca55c723a82c929252203e\" returns successfully" Feb 12 22:06:48.001509 systemd[1]: Removed slice kubepods-besteffort-podc6f8e870_ff6c_408f_a44a_bb4bcbf5f531.slice. Feb 12 22:06:48.077209 systemd[1]: var-lib-kubelet-pods-c6f8e870\x2dff6c\x2d408f\x2da44a\x2dbb4bcbf5f531-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 12 22:06:48.077283 systemd[1]: var-lib-kubelet-pods-c6f8e870\x2dff6c\x2d408f\x2da44a\x2dbb4bcbf5f531-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dxj6q8.mount: Deactivated successfully. Feb 12 22:06:48.113293 kubelet[2131]: I0212 22:06:48.113269 2131 scope.go:117] "RemoveContainer" containerID="e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c" Feb 12 22:06:48.132114 kubelet[2131]: I0212 22:06:48.132082 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-58f5df5499-l6rwm" podStartSLOduration=8.132056822 podCreationTimestamp="2024-02-12 22:06:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:06:48.120242847 +0000 UTC m=+28.193186601" watchObservedRunningTime="2024-02-12 22:06:48.132056822 +0000 UTC m=+28.205000571" Feb 12 22:06:48.132535 env[1153]: time="2024-02-12T22:06:48.132515375Z" level=info msg="RemoveContainer for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\"" Feb 12 22:06:48.216652 env[1153]: time="2024-02-12T22:06:48.216617679Z" level=info msg="RemoveContainer for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" returns successfully" Feb 12 22:06:48.216807 kubelet[2131]: I0212 22:06:48.216739 2131 scope.go:117] "RemoveContainer" containerID="e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c" Feb 12 22:06:48.216938 env[1153]: time="2024-02-12T22:06:48.216873198Z" level=error msg="ContainerStatus for \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\": not found" Feb 12 22:06:48.217015 kubelet[2131]: E0212 22:06:48.217001 2131 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\": not found" containerID="e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c" Feb 12 22:06:48.217054 kubelet[2131]: I0212 22:06:48.217037 2131 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c"} err="failed to get container status \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\": rpc error: code = NotFound desc = an error occurred when try to find container \"e3a8794d1e323923641b3fb04ff006dbdb20335f099dcd3a46935547c74a436c\": not found" Feb 12 22:06:48.295000 audit[3016]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:48.295000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc9ed78e90 a2=0 a3=7ffc9ed78e7c items=0 ppid=2291 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:48.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:48.295000 audit[3016]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:06:48.295000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc9ed78e90 a2=0 a3=31030 items=0 ppid=2291 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:48.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:06:48.997295 kubelet[2131]: E0212 22:06:48.997271 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:50.000097 kubelet[2131]: I0212 22:06:49.999973 2131 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="c6f8e870-ff6c-408f-a44a-bb4bcbf5f531" path="/var/lib/kubelet/pods/c6f8e870-ff6c-408f-a44a-bb4bcbf5f531/volumes" Feb 12 22:06:50.997809 kubelet[2131]: E0212 22:06:50.997765 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:52.403751 env[1153]: time="2024-02-12T22:06:52.403713934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:52.407192 env[1153]: time="2024-02-12T22:06:52.407154046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:52.408728 env[1153]: time="2024-02-12T22:06:52.408709082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:52.410119 env[1153]: time="2024-02-12T22:06:52.410095447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:06:52.410909 env[1153]: time="2024-02-12T22:06:52.410885101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 22:06:52.414826 env[1153]: time="2024-02-12T22:06:52.414798577Z" level=info msg="CreateContainer within sandbox \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 22:06:52.426426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1273104211.mount: Deactivated successfully. Feb 12 22:06:52.436343 env[1153]: time="2024-02-12T22:06:52.436304378Z" level=info msg="CreateContainer within sandbox \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69\"" Feb 12 22:06:52.437018 env[1153]: time="2024-02-12T22:06:52.437004303Z" level=info msg="StartContainer for \"9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69\"" Feb 12 22:06:52.462485 systemd[1]: Started cri-containerd-9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69.scope. Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.474948 kernel: kauditd_printk_skb: 183 callbacks suppressed Feb 12 22:06:52.475081 kernel: audit: type=1400 audit(1707775612.473:1197): avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7d409ff238 items=0 ppid=2717 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:52.481162 kernel: audit: type=1300 audit(1707775612.473:1197): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7d409ff238 items=0 ppid=2717 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:52.481224 kernel: audit: type=1327 audit(1707775612.473:1197): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653039343664393037346633303233313533396235393435306163 Feb 12 22:06:52.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653039343664393037346633303233313533396235393435306163 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.486931 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.486963 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.489532 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.491892 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.497123 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.500199 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.473000 audit: BPF prog-id=157 op=LOAD Feb 12 22:06:52.473000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000296888 items=0 ppid=2717 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:52.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653039343664393037346633303233313533396235393435306163 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.503196 kernel: audit: type=1400 audit(1707775612.473:1198): avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.477000 audit: BPF prog-id=158 op=LOAD Feb 12 22:06:52.477000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002968d8 items=0 ppid=2717 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:52.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653039343664393037346633303233313533396235393435306163 Feb 12 22:06:52.484000 audit: BPF prog-id=158 op=UNLOAD Feb 12 22:06:52.484000 audit: BPF prog-id=157 op=UNLOAD Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:06:52.484000 audit: BPF prog-id=159 op=LOAD Feb 12 22:06:52.484000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000296968 items=0 ppid=2717 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:06:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963653039343664393037346633303233313533396235393435306163 Feb 12 22:06:52.520021 env[1153]: time="2024-02-12T22:06:52.519988942Z" level=info msg="StartContainer for \"9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69\" returns successfully" Feb 12 22:06:52.996980 kubelet[2131]: E0212 22:06:52.996954 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:53.424004 systemd[1]: run-containerd-runc-k8s.io-9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69-runc.IP4nyg.mount: Deactivated successfully. Feb 12 22:06:54.997474 kubelet[2131]: E0212 22:06:54.997453 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:55.763167 env[1153]: time="2024-02-12T22:06:55.763114089Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:06:55.765514 systemd[1]: cri-containerd-9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69.scope: Deactivated successfully. Feb 12 22:06:55.768000 audit: BPF prog-id=159 op=UNLOAD Feb 12 22:06:55.780937 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69-rootfs.mount: Deactivated successfully. Feb 12 22:06:55.785551 env[1153]: time="2024-02-12T22:06:55.785523650Z" level=info msg="shim disconnected" id=9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69 Feb 12 22:06:55.785712 env[1153]: time="2024-02-12T22:06:55.785699353Z" level=warning msg="cleaning up after shim disconnected" id=9ce0946d9074f30231539b59450ac5e6ededfd93cd568b15d68c26bca31d9d69 namespace=k8s.io Feb 12 22:06:55.785775 env[1153]: time="2024-02-12T22:06:55.785764390Z" level=info msg="cleaning up dead shim" Feb 12 22:06:55.791158 env[1153]: time="2024-02-12T22:06:55.791108842Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:06:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3070 runtime=io.containerd.runc.v2\n" Feb 12 22:06:55.835817 kubelet[2131]: I0212 22:06:55.835798 2131 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 22:06:55.940545 kubelet[2131]: I0212 22:06:55.940521 2131 topology_manager.go:215] "Topology Admit Handler" podUID="a7ff1354-1007-4a30-8f38-4daf767f1c55" podNamespace="kube-system" podName="coredns-5dd5756b68-ll48v" Feb 12 22:06:55.943932 kubelet[2131]: I0212 22:06:55.943905 2131 topology_manager.go:215] "Topology Admit Handler" podUID="632a11c2-55e9-4240-ae20-d43bedff425d" podNamespace="kube-system" podName="coredns-5dd5756b68-qpqf4" Feb 12 22:06:55.944228 kubelet[2131]: I0212 22:06:55.944216 2131 topology_manager.go:215] "Topology Admit Handler" podUID="74ecb67b-9ec9-4e25-b077-620265613885" podNamespace="calico-system" podName="calico-kube-controllers-6cdd45c5cd-74d55" Feb 12 22:06:55.949072 systemd[1]: Created slice kubepods-burstable-poda7ff1354_1007_4a30_8f38_4daf767f1c55.slice. Feb 12 22:06:55.953646 systemd[1]: Created slice kubepods-burstable-pod632a11c2_55e9_4240_ae20_d43bedff425d.slice. Feb 12 22:06:55.957356 systemd[1]: Created slice kubepods-besteffort-pod74ecb67b_9ec9_4e25_b077_620265613885.slice. Feb 12 22:06:56.040193 kubelet[2131]: I0212 22:06:56.040116 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a7ff1354-1007-4a30-8f38-4daf767f1c55-config-volume\") pod \"coredns-5dd5756b68-ll48v\" (UID: \"a7ff1354-1007-4a30-8f38-4daf767f1c55\") " pod="kube-system/coredns-5dd5756b68-ll48v" Feb 12 22:06:56.040454 kubelet[2131]: I0212 22:06:56.040446 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s7lf4\" (UniqueName: \"kubernetes.io/projected/74ecb67b-9ec9-4e25-b077-620265613885-kube-api-access-s7lf4\") pod \"calico-kube-controllers-6cdd45c5cd-74d55\" (UID: \"74ecb67b-9ec9-4e25-b077-620265613885\") " pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" Feb 12 22:06:56.040528 kubelet[2131]: I0212 22:06:56.040521 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/632a11c2-55e9-4240-ae20-d43bedff425d-config-volume\") pod \"coredns-5dd5756b68-qpqf4\" (UID: \"632a11c2-55e9-4240-ae20-d43bedff425d\") " pod="kube-system/coredns-5dd5756b68-qpqf4" Feb 12 22:06:56.040597 kubelet[2131]: I0212 22:06:56.040591 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zd785\" (UniqueName: \"kubernetes.io/projected/632a11c2-55e9-4240-ae20-d43bedff425d-kube-api-access-zd785\") pod \"coredns-5dd5756b68-qpqf4\" (UID: \"632a11c2-55e9-4240-ae20-d43bedff425d\") " pod="kube-system/coredns-5dd5756b68-qpqf4" Feb 12 22:06:56.040708 kubelet[2131]: I0212 22:06:56.040701 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zg4rg\" (UniqueName: \"kubernetes.io/projected/a7ff1354-1007-4a30-8f38-4daf767f1c55-kube-api-access-zg4rg\") pod \"coredns-5dd5756b68-ll48v\" (UID: \"a7ff1354-1007-4a30-8f38-4daf767f1c55\") " pod="kube-system/coredns-5dd5756b68-ll48v" Feb 12 22:06:56.040781 kubelet[2131]: I0212 22:06:56.040774 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/74ecb67b-9ec9-4e25-b077-620265613885-tigera-ca-bundle\") pod \"calico-kube-controllers-6cdd45c5cd-74d55\" (UID: \"74ecb67b-9ec9-4e25-b077-620265613885\") " pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" Feb 12 22:06:56.127765 env[1153]: time="2024-02-12T22:06:56.127542883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 22:06:56.251790 env[1153]: time="2024-02-12T22:06:56.251688927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ll48v,Uid:a7ff1354-1007-4a30-8f38-4daf767f1c55,Namespace:kube-system,Attempt:0,}" Feb 12 22:06:56.256495 env[1153]: time="2024-02-12T22:06:56.256366908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qpqf4,Uid:632a11c2-55e9-4240-ae20-d43bedff425d,Namespace:kube-system,Attempt:0,}" Feb 12 22:06:56.259850 env[1153]: time="2024-02-12T22:06:56.259737005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd45c5cd-74d55,Uid:74ecb67b-9ec9-4e25-b077-620265613885,Namespace:calico-system,Attempt:0,}" Feb 12 22:06:56.586844 env[1153]: time="2024-02-12T22:06:56.586798305Z" level=error msg="Failed to destroy network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.587202 env[1153]: time="2024-02-12T22:06:56.587182302Z" level=error msg="encountered an error cleaning up failed sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.587298 env[1153]: time="2024-02-12T22:06:56.587278586Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ll48v,Uid:a7ff1354-1007-4a30-8f38-4daf767f1c55,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.591786 env[1153]: time="2024-02-12T22:06:56.591714948Z" level=error msg="Failed to destroy network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.592105 env[1153]: time="2024-02-12T22:06:56.592075486Z" level=error msg="encountered an error cleaning up failed sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.592144 env[1153]: time="2024-02-12T22:06:56.592119606Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd45c5cd-74d55,Uid:74ecb67b-9ec9-4e25-b077-620265613885,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.596293 kubelet[2131]: E0212 22:06:56.596262 2131 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.601456 kubelet[2131]: E0212 22:06:56.596318 2131 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" Feb 12 22:06:56.601456 kubelet[2131]: E0212 22:06:56.596342 2131 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" Feb 12 22:06:56.601456 kubelet[2131]: E0212 22:06:56.596405 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6cdd45c5cd-74d55_calico-system(74ecb67b-9ec9-4e25-b077-620265613885)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6cdd45c5cd-74d55_calico-system(74ecb67b-9ec9-4e25-b077-620265613885)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" podUID="74ecb67b-9ec9-4e25-b077-620265613885" Feb 12 22:06:56.601632 kubelet[2131]: E0212 22:06:56.596421 2131 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.601632 kubelet[2131]: E0212 22:06:56.596444 2131 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ll48v" Feb 12 22:06:56.601632 kubelet[2131]: E0212 22:06:56.596457 2131 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ll48v" Feb 12 22:06:56.606009 kubelet[2131]: E0212 22:06:56.596482 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-ll48v_kube-system(a7ff1354-1007-4a30-8f38-4daf767f1c55)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-ll48v_kube-system(a7ff1354-1007-4a30-8f38-4daf767f1c55)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ll48v" podUID="a7ff1354-1007-4a30-8f38-4daf767f1c55" Feb 12 22:06:56.609566 env[1153]: time="2024-02-12T22:06:56.609529087Z" level=error msg="Failed to destroy network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.609885 env[1153]: time="2024-02-12T22:06:56.609868320Z" level=error msg="encountered an error cleaning up failed sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.609961 env[1153]: time="2024-02-12T22:06:56.609945021Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qpqf4,Uid:632a11c2-55e9-4240-ae20-d43bedff425d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.610945 kubelet[2131]: E0212 22:06:56.610149 2131 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:56.610945 kubelet[2131]: E0212 22:06:56.610190 2131 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-qpqf4" Feb 12 22:06:56.610945 kubelet[2131]: E0212 22:06:56.610209 2131 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-qpqf4" Feb 12 22:06:56.611046 kubelet[2131]: E0212 22:06:56.610253 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-qpqf4_kube-system(632a11c2-55e9-4240-ae20-d43bedff425d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-qpqf4_kube-system(632a11c2-55e9-4240-ae20-d43bedff425d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-qpqf4" podUID="632a11c2-55e9-4240-ae20-d43bedff425d" Feb 12 22:06:56.781501 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7-shm.mount: Deactivated successfully. Feb 12 22:06:57.001142 systemd[1]: Created slice kubepods-besteffort-podc4db62a6_5db0_4596_b7c7_a5483034a42b.slice. Feb 12 22:06:57.003681 env[1153]: time="2024-02-12T22:06:57.003636969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ssbfr,Uid:c4db62a6-5db0-4596-b7c7-a5483034a42b,Namespace:calico-system,Attempt:0,}" Feb 12 22:06:57.104516 env[1153]: time="2024-02-12T22:06:57.104483909Z" level=error msg="Failed to destroy network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.105696 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44-shm.mount: Deactivated successfully. Feb 12 22:06:57.106345 env[1153]: time="2024-02-12T22:06:57.106324624Z" level=error msg="encountered an error cleaning up failed sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.106422 env[1153]: time="2024-02-12T22:06:57.106405562Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ssbfr,Uid:c4db62a6-5db0-4596-b7c7-a5483034a42b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.106624 kubelet[2131]: E0212 22:06:57.106606 2131 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.106796 kubelet[2131]: E0212 22:06:57.106661 2131 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:57.106796 kubelet[2131]: E0212 22:06:57.106681 2131 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ssbfr" Feb 12 22:06:57.106796 kubelet[2131]: E0212 22:06:57.106742 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ssbfr_calico-system(c4db62a6-5db0-4596-b7c7-a5483034a42b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ssbfr_calico-system(c4db62a6-5db0-4596-b7c7-a5483034a42b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:57.128833 kubelet[2131]: I0212 22:06:57.128815 2131 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:06:57.129987 env[1153]: time="2024-02-12T22:06:57.129287527Z" level=info msg="StopPodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\"" Feb 12 22:06:57.131509 kubelet[2131]: I0212 22:06:57.130854 2131 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:06:57.131698 env[1153]: time="2024-02-12T22:06:57.131671577Z" level=info msg="StopPodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\"" Feb 12 22:06:57.132603 kubelet[2131]: I0212 22:06:57.132429 2131 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:06:57.132689 env[1153]: time="2024-02-12T22:06:57.132647913Z" level=info msg="StopPodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\"" Feb 12 22:06:57.133500 kubelet[2131]: I0212 22:06:57.133350 2131 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:06:57.133553 env[1153]: time="2024-02-12T22:06:57.133537418Z" level=info msg="StopPodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\"" Feb 12 22:06:57.167100 env[1153]: time="2024-02-12T22:06:57.167068821Z" level=error msg="StopPodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" failed" error="failed to destroy network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.167417 kubelet[2131]: E0212 22:06:57.167331 2131 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:06:57.167417 kubelet[2131]: E0212 22:06:57.167357 2131 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e"} Feb 12 22:06:57.167417 kubelet[2131]: E0212 22:06:57.167379 2131 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a7ff1354-1007-4a30-8f38-4daf767f1c55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:06:57.167417 kubelet[2131]: E0212 22:06:57.167396 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a7ff1354-1007-4a30-8f38-4daf767f1c55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ll48v" podUID="a7ff1354-1007-4a30-8f38-4daf767f1c55" Feb 12 22:06:57.168449 env[1153]: time="2024-02-12T22:06:57.168424836Z" level=error msg="StopPodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" failed" error="failed to destroy network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.168611 kubelet[2131]: E0212 22:06:57.168547 2131 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:06:57.168611 kubelet[2131]: E0212 22:06:57.168562 2131 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7"} Feb 12 22:06:57.168611 kubelet[2131]: E0212 22:06:57.168583 2131 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"632a11c2-55e9-4240-ae20-d43bedff425d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:06:57.168611 kubelet[2131]: E0212 22:06:57.168599 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"632a11c2-55e9-4240-ae20-d43bedff425d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-qpqf4" podUID="632a11c2-55e9-4240-ae20-d43bedff425d" Feb 12 22:06:57.168779 env[1153]: time="2024-02-12T22:06:57.168759085Z" level=error msg="StopPodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" failed" error="failed to destroy network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:06:57.168967 kubelet[2131]: E0212 22:06:57.168905 2131 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:06:57.168967 kubelet[2131]: E0212 22:06:57.168917 2131 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb"} Feb 12 22:06:57.168967 kubelet[2131]: E0212 22:06:57.168935 2131 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"74ecb67b-9ec9-4e25-b077-620265613885\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:06:57.168967 kubelet[2131]: E0212 22:06:57.168952 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"74ecb67b-9ec9-4e25-b077-620265613885\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" podUID="74ecb67b-9ec9-4e25-b077-620265613885" Feb 12 22:06:57.179695 kubelet[2131]: E0212 22:06:57.177200 2131 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:06:57.179695 kubelet[2131]: E0212 22:06:57.177219 2131 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44"} Feb 12 22:06:57.179695 kubelet[2131]: E0212 22:06:57.177238 2131 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4db62a6-5db0-4596-b7c7-a5483034a42b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:06:57.179695 kubelet[2131]: E0212 22:06:57.177255 2131 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4db62a6-5db0-4596-b7c7-a5483034a42b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ssbfr" podUID="c4db62a6-5db0-4596-b7c7-a5483034a42b" Feb 12 22:06:57.179814 env[1153]: time="2024-02-12T22:06:57.177042242Z" level=error msg="StopPodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" failed" error="failed to destroy network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:07:03.902413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240242954.mount: Deactivated successfully. Feb 12 22:07:04.598952 env[1153]: time="2024-02-12T22:07:04.598914766Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:04.601418 env[1153]: time="2024-02-12T22:07:04.601396597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:04.602437 env[1153]: time="2024-02-12T22:07:04.602417773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:04.603357 env[1153]: time="2024-02-12T22:07:04.603338404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:04.603643 env[1153]: time="2024-02-12T22:07:04.603623112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 22:07:04.647594 env[1153]: time="2024-02-12T22:07:04.647565227Z" level=info msg="CreateContainer within sandbox \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 22:07:04.656600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1533987954.mount: Deactivated successfully. Feb 12 22:07:04.659253 env[1153]: time="2024-02-12T22:07:04.659188506Z" level=info msg="CreateContainer within sandbox \"54e3b9c80aa8a4ef108d1575ac751cb9f4b367ec2c9db8f9401571645426adbf\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298\"" Feb 12 22:07:04.660593 env[1153]: time="2024-02-12T22:07:04.660568450Z" level=info msg="StartContainer for \"26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298\"" Feb 12 22:07:04.679227 systemd[1]: Started cri-containerd-26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298.scope. Feb 12 22:07:04.707261 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 22:07:04.707346 kernel: audit: type=1400 audit(1707775624.695:1204): avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.723410 kernel: audit: type=1300 audit(1707775624.695:1204): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f1f080b29e8 items=0 ppid=2717 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:04.723470 kernel: audit: type=1327 audit(1707775624.695:1204): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393831616136306465616436393162383832653938366537313262 Feb 12 22:07:04.728244 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.728274 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.728288 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.728301 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.728315 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.728336 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.728351 kernel: audit: type=1400 audit(1707775624.695:1205): avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f1f080b29e8 items=0 ppid=2717 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393831616136306465616436393162383832653938366537313262 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.695000 audit: BPF prog-id=160 op=LOAD Feb 12 22:07:04.695000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00025cfc8 items=0 ppid=2717 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393831616136306465616436393162383832653938366537313262 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.703000 audit: BPF prog-id=161 op=LOAD Feb 12 22:07:04.703000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00025d018 items=0 ppid=2717 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:04.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393831616136306465616436393162383832653938366537313262 Feb 12 22:07:04.706000 audit: BPF prog-id=161 op=UNLOAD Feb 12 22:07:04.706000 audit: BPF prog-id=160 op=UNLOAD Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:04.706000 audit: BPF prog-id=162 op=LOAD Feb 12 22:07:04.706000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00025d0a8 items=0 ppid=2717 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:04.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393831616136306465616436393162383832653938366537313262 Feb 12 22:07:04.803255 env[1153]: time="2024-02-12T22:07:04.774372086Z" level=info msg="StartContainer for \"26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298\" returns successfully" Feb 12 22:07:05.186843 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 22:07:05.186959 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 22:07:05.375645 kubelet[2131]: I0212 22:07:05.375606 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8hcvt" podStartSLOduration=1.8695389759999999 podCreationTimestamp="2024-02-12 22:06:44 +0000 UTC" firstStartedPulling="2024-02-12 22:06:45.10674993 +0000 UTC m=+25.179693676" lastFinishedPulling="2024-02-12 22:07:04.604074926 +0000 UTC m=+44.677018673" observedRunningTime="2024-02-12 22:07:05.347091138 +0000 UTC m=+45.420034893" watchObservedRunningTime="2024-02-12 22:07:05.366863973 +0000 UTC m=+45.439807744" Feb 12 22:07:06.591000 audit[3399]: AVC avc: denied { write } for pid=3399 comm="tee" name="fd" dev="proc" ino=35509 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.591000 audit[3399]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd9b3b98f a2=241 a3=1b6 items=1 ppid=3373 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.591000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 22:07:06.591000 audit: PATH item=0 name="/dev/fd/63" inode=35492 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.591000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:06.593000 audit[3408]: AVC avc: denied { write } for pid=3408 comm="tee" name="fd" dev="proc" ino=35973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.593000 audit[3408]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc255c0990 a2=241 a3=1b6 items=1 ppid=3371 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.593000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 22:07:06.593000 audit: PATH item=0 name="/dev/fd/63" inode=35970 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.593000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:06.611000 audit[3430]: AVC avc: denied { write } for pid=3430 comm="tee" name="fd" dev="proc" ino=35534 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.611000 audit[3430]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea3b4598f a2=241 a3=1b6 items=1 ppid=3379 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.611000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 22:07:06.611000 audit: PATH item=0 name="/dev/fd/63" inode=35525 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.613000 audit[3434]: AVC avc: denied { write } for pid=3434 comm="tee" name="fd" dev="proc" ino=35538 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.613000 audit[3434]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6e02297f a2=241 a3=1b6 items=1 ppid=3383 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.613000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 22:07:06.613000 audit: PATH item=0 name="/dev/fd/63" inode=35529 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.613000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:06.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:06.619000 audit[3423]: AVC avc: denied { write } for pid=3423 comm="tee" name="fd" dev="proc" ino=35992 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.619000 audit[3423]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2c6ea991 a2=241 a3=1b6 items=1 ppid=3374 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.619000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 22:07:06.619000 audit: PATH item=0 name="/dev/fd/63" inode=35977 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:06.622000 audit[3442]: AVC avc: denied { write } for pid=3442 comm="tee" name="fd" dev="proc" ino=35999 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.622000 audit[3442]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0f48a980 a2=241 a3=1b6 items=1 ppid=3376 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.622000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 22:07:06.622000 audit: PATH item=0 name="/dev/fd/63" inode=35540 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:06.626000 audit[3446]: AVC avc: denied { write } for pid=3446 comm="tee" name="fd" dev="proc" ino=35546 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:07:06.626000 audit[3446]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed1b998f a2=241 a3=1b6 items=1 ppid=3392 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:06.626000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 22:07:06.626000 audit: PATH item=0 name="/dev/fd/63" inode=35996 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:07:06.626000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:07:09.000644 env[1153]: time="2024-02-12T22:07:09.000613083Z" level=info msg="StopPodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\"" Feb 12 22:07:09.000977 env[1153]: time="2024-02-12T22:07:09.000879850Z" level=info msg="StopPodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\"" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.068 [INFO][3524] k8s.go 578: Cleaning up netns ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.069 [INFO][3524] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" iface="eth0" netns="/var/run/netns/cni-af7de4ce-97b2-dc6f-7ea6-5ed7662c3c72" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.069 [INFO][3524] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" iface="eth0" netns="/var/run/netns/cni-af7de4ce-97b2-dc6f-7ea6-5ed7662c3c72" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.070 [INFO][3524] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" iface="eth0" netns="/var/run/netns/cni-af7de4ce-97b2-dc6f-7ea6-5ed7662c3c72" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.070 [INFO][3524] k8s.go 585: Releasing IP address(es) ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.070 [INFO][3524] utils.go 188: Calico CNI releasing IP address ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.302 [INFO][3536] ipam_plugin.go 415: Releasing address using handleID ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.304 [INFO][3536] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.304 [INFO][3536] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.312 [WARNING][3536] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.312 [INFO][3536] ipam_plugin.go 443: Releasing address using workloadID ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.313 [INFO][3536] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:09.318210 env[1153]: 2024-02-12 22:07:09.316 [INFO][3524] k8s.go 591: Teardown processing complete. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:09.320601 env[1153]: time="2024-02-12T22:07:09.320099732Z" level=info msg="TearDown network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" successfully" Feb 12 22:07:09.320601 env[1153]: time="2024-02-12T22:07:09.320120983Z" level=info msg="StopPodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" returns successfully" Feb 12 22:07:09.319446 systemd[1]: run-netns-cni\x2daf7de4ce\x2d97b2\x2ddc6f\x2d7ea6\x2d5ed7662c3c72.mount: Deactivated successfully. Feb 12 22:07:09.322071 env[1153]: time="2024-02-12T22:07:09.322049607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ssbfr,Uid:c4db62a6-5db0-4596-b7c7-a5483034a42b,Namespace:calico-system,Attempt:1,}" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.067 [INFO][3525] k8s.go 578: Cleaning up netns ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.068 [INFO][3525] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" iface="eth0" netns="/var/run/netns/cni-2c6df153-51ac-9997-02fa-07768633f6d2" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.068 [INFO][3525] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" iface="eth0" netns="/var/run/netns/cni-2c6df153-51ac-9997-02fa-07768633f6d2" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.070 [INFO][3525] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" iface="eth0" netns="/var/run/netns/cni-2c6df153-51ac-9997-02fa-07768633f6d2" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.070 [INFO][3525] k8s.go 585: Releasing IP address(es) ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.070 [INFO][3525] utils.go 188: Calico CNI releasing IP address ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.302 [INFO][3537] ipam_plugin.go 415: Releasing address using handleID ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.304 [INFO][3537] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.313 [INFO][3537] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.319 [WARNING][3537] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.319 [INFO][3537] ipam_plugin.go 443: Releasing address using workloadID ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.322 [INFO][3537] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:09.324947 env[1153]: 2024-02-12 22:07:09.323 [INFO][3525] k8s.go 591: Teardown processing complete. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:09.327233 env[1153]: time="2024-02-12T22:07:09.326890646Z" level=info msg="TearDown network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" successfully" Feb 12 22:07:09.327233 env[1153]: time="2024-02-12T22:07:09.326913286Z" level=info msg="StopPodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" returns successfully" Feb 12 22:07:09.326280 systemd[1]: run-netns-cni\x2d2c6df153\x2d51ac\x2d9997\x2d02fa\x2d07768633f6d2.mount: Deactivated successfully. Feb 12 22:07:09.327327 env[1153]: time="2024-02-12T22:07:09.327295120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd45c5cd-74d55,Uid:74ecb67b-9ec9-4e25-b077-620265613885,Namespace:calico-system,Attempt:1,}" Feb 12 22:07:09.433547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:07:09.433939 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califebf149117f: link becomes ready Feb 12 22:07:09.440077 systemd-networkd[1062]: califebf149117f: Link UP Feb 12 22:07:09.441687 systemd-networkd[1062]: califebf149117f: Gained carrier Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.358 [INFO][3548] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.366 [INFO][3548] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--ssbfr-eth0 csi-node-driver- calico-system c4db62a6-5db0-4596-b7c7-a5483034a42b 758 0 2024-02-12 22:06:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-ssbfr eth0 default [] [] [kns.calico-system ksa.calico-system.default] califebf149117f [] []}} ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.366 [INFO][3548] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.396 [INFO][3571] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" HandleID="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.401 [INFO][3571] ipam_plugin.go 268: Auto assigning IP ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" HandleID="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050530), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-ssbfr", "timestamp":"2024-02-12 22:07:09.396015134 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.401 [INFO][3571] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.401 [INFO][3571] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.401 [INFO][3571] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.402 [INFO][3571] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.407 [INFO][3571] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.410 [INFO][3571] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.410 [INFO][3571] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.411 [INFO][3571] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.411 [INFO][3571] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.412 [INFO][3571] ipam.go 1682: Creating new handle: k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.414 [INFO][3571] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.419 [INFO][3571] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.419 [INFO][3571] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" host="localhost" Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.419 [INFO][3571] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:09.450334 env[1153]: 2024-02-12 22:07:09.419 [INFO][3571] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" HandleID="k8s-pod-network.4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.454434 env[1153]: 2024-02-12 22:07:09.423 [INFO][3548] k8s.go 385: Populated endpoint ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ssbfr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4db62a6-5db0-4596-b7c7-a5483034a42b", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-ssbfr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califebf149117f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:09.454434 env[1153]: 2024-02-12 22:07:09.423 [INFO][3548] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.454434 env[1153]: 2024-02-12 22:07:09.423 [INFO][3548] dataplane_linux.go 68: Setting the host side veth name to califebf149117f ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.454434 env[1153]: 2024-02-12 22:07:09.433 [INFO][3548] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.454434 env[1153]: 2024-02-12 22:07:09.434 [INFO][3548] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ssbfr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4db62a6-5db0-4596-b7c7-a5483034a42b", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b", Pod:"csi-node-driver-ssbfr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califebf149117f", MAC:"7e:9a:73:cd:b0:eb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:09.454434 env[1153]: 2024-02-12 22:07:09.442 [INFO][3548] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b" Namespace="calico-system" Pod="csi-node-driver-ssbfr" WorkloadEndpoint="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:09.458469 systemd-networkd[1062]: cali4a5e2249b65: Link UP Feb 12 22:07:09.460434 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a5e2249b65: link becomes ready Feb 12 22:07:09.460223 systemd-networkd[1062]: cali4a5e2249b65: Gained carrier Feb 12 22:07:09.466218 env[1153]: time="2024-02-12T22:07:09.464932390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:07:09.466218 env[1153]: time="2024-02-12T22:07:09.464957753Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:07:09.466218 env[1153]: time="2024-02-12T22:07:09.464965017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:07:09.466218 env[1153]: time="2024-02-12T22:07:09.465025231Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b pid=3607 runtime=io.containerd.runc.v2 Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.374 [INFO][3550] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.380 [INFO][3550] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0 calico-kube-controllers-6cdd45c5cd- calico-system 74ecb67b-9ec9-4e25-b077-620265613885 757 0 2024-02-12 22:06:40 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6cdd45c5cd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6cdd45c5cd-74d55 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4a5e2249b65 [] []}} ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.380 [INFO][3550] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.416 [INFO][3577] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" HandleID="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.427 [INFO][3577] ipam_plugin.go 268: Auto assigning IP ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" HandleID="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002befa0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6cdd45c5cd-74d55", "timestamp":"2024-02-12 22:07:09.416345713 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.427 [INFO][3577] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.427 [INFO][3577] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.427 [INFO][3577] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.428 [INFO][3577] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.431 [INFO][3577] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.444 [INFO][3577] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.446 [INFO][3577] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.447 [INFO][3577] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.447 [INFO][3577] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.448 [INFO][3577] ipam.go 1682: Creating new handle: k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343 Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.450 [INFO][3577] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.455 [INFO][3577] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.455 [INFO][3577] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" host="localhost" Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.455 [INFO][3577] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:09.491902 env[1153]: 2024-02-12 22:07:09.455 [INFO][3577] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" HandleID="k8s-pod-network.930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.492542 env[1153]: 2024-02-12 22:07:09.456 [INFO][3550] k8s.go 385: Populated endpoint ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0", GenerateName:"calico-kube-controllers-6cdd45c5cd-", Namespace:"calico-system", SelfLink:"", UID:"74ecb67b-9ec9-4e25-b077-620265613885", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd45c5cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6cdd45c5cd-74d55", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a5e2249b65", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:09.492542 env[1153]: 2024-02-12 22:07:09.456 [INFO][3550] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.492542 env[1153]: 2024-02-12 22:07:09.456 [INFO][3550] dataplane_linux.go 68: Setting the host side veth name to cali4a5e2249b65 ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.492542 env[1153]: 2024-02-12 22:07:09.460 [INFO][3550] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.492542 env[1153]: 2024-02-12 22:07:09.460 [INFO][3550] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0", GenerateName:"calico-kube-controllers-6cdd45c5cd-", Namespace:"calico-system", SelfLink:"", UID:"74ecb67b-9ec9-4e25-b077-620265613885", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd45c5cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343", Pod:"calico-kube-controllers-6cdd45c5cd-74d55", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a5e2249b65", MAC:"4e:d1:00:b9:e5:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:09.492542 env[1153]: 2024-02-12 22:07:09.490 [INFO][3550] k8s.go 491: Wrote updated endpoint to datastore ContainerID="930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343" Namespace="calico-system" Pod="calico-kube-controllers-6cdd45c5cd-74d55" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:09.497218 systemd[1]: Started cri-containerd-4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b.scope. Feb 12 22:07:09.512196 env[1153]: time="2024-02-12T22:07:09.512111203Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:07:09.512196 env[1153]: time="2024-02-12T22:07:09.512187172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:07:09.512359 env[1153]: time="2024-02-12T22:07:09.512205841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:07:09.512359 env[1153]: time="2024-02-12T22:07:09.512309321Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343 pid=3652 runtime=io.containerd.runc.v2 Feb 12 22:07:09.532950 systemd[1]: Started cri-containerd-930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343.scope. Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit: BPF prog-id=163 op=LOAD Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3607 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373465303266656436643265613935343131663061343530663934 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3607 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373465303266656436643265613935343131663061343530663934 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit: BPF prog-id=164 op=LOAD Feb 12 22:07:09.537000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001be750 items=0 ppid=3607 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373465303266656436643265613935343131663061343530663934 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit: BPF prog-id=165 op=LOAD Feb 12 22:07:09.537000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001be798 items=0 ppid=3607 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373465303266656436643265613935343131663061343530663934 Feb 12 22:07:09.537000 audit: BPF prog-id=165 op=UNLOAD Feb 12 22:07:09.537000 audit: BPF prog-id=164 op=UNLOAD Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.537000 audit: BPF prog-id=166 op=LOAD Feb 12 22:07:09.537000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001beba8 items=0 ppid=3607 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373465303266656436643265613935343131663061343530663934 Feb 12 22:07:09.538915 systemd-resolved[1101]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:07:09.562637 env[1153]: time="2024-02-12T22:07:09.547762565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ssbfr,Uid:c4db62a6-5db0-4596-b7c7-a5483034a42b,Namespace:calico-system,Attempt:1,} returns sandbox id \"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b\"" Feb 12 22:07:09.562637 env[1153]: time="2024-02-12T22:07:09.548515780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.562000 audit: BPF prog-id=167 op=LOAD Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3652 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303731386665663636313538633663373661626561343362316630 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3652 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303731386665663636313538633663373661626561343362316630 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit: BPF prog-id=168 op=LOAD Feb 12 22:07:09.563000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c40a0 items=0 ppid=3652 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303731386665663636313538633663373661626561343362316630 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit: BPF prog-id=169 op=LOAD Feb 12 22:07:09.563000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c40e8 items=0 ppid=3652 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303731386665663636313538633663373661626561343362316630 Feb 12 22:07:09.563000 audit: BPF prog-id=169 op=UNLOAD Feb 12 22:07:09.563000 audit: BPF prog-id=168 op=UNLOAD Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:09.563000 audit: BPF prog-id=170 op=LOAD Feb 12 22:07:09.563000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c44f8 items=0 ppid=3652 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303731386665663636313538633663373661626561343362316630 Feb 12 22:07:09.564014 systemd-resolved[1101]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:07:09.581947 env[1153]: time="2024-02-12T22:07:09.581885761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd45c5cd-74d55,Uid:74ecb67b-9ec9-4e25-b077-620265613885,Namespace:calico-system,Attempt:1,} returns sandbox id \"930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343\"" Feb 12 22:07:09.690334 kubelet[2131]: I0212 22:07:09.689893 2131 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:07:09.847806 kernel: kauditd_printk_skb: 182 callbacks suppressed Feb 12 22:07:09.847885 kernel: audit: type=1325 audit(1707775629.844:1253): table=filter:101 family=2 entries=15 op=nft_register_rule pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:09.844000 audit[3696]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:09.851963 kernel: audit: type=1300 audit(1707775629.844:1253): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffcbe05e10 a2=0 a3=7fffcbe05dfc items=0 ppid=2291 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.844000 audit[3696]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffcbe05e10 a2=0 a3=7fffcbe05dfc items=0 ppid=2291 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:09.858305 kernel: audit: type=1327 audit(1707775629.844:1253): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:09.858338 kernel: audit: type=1325 audit(1707775629.845:1254): table=nat:102 family=2 entries=19 op=nft_register_chain pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:09.845000 audit[3696]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:09.845000 audit[3696]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fffcbe05e10 a2=0 a3=7fffcbe05dfc items=0 ppid=2291 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.865181 kernel: audit: type=1300 audit(1707775629.845:1254): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fffcbe05e10 a2=0 a3=7fffcbe05dfc items=0 ppid=2291 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:09.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:09.868196 kernel: audit: type=1327 audit(1707775629.845:1254): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:09.998210 env[1153]: time="2024-02-12T22:07:09.998154593Z" level=info msg="StopPodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\"" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.043 [INFO][3749] k8s.go 578: Cleaning up netns ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.043 [INFO][3749] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" iface="eth0" netns="/var/run/netns/cni-4ea3aab2-42fe-1903-6455-ea0719629ae2" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.043 [INFO][3749] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" iface="eth0" netns="/var/run/netns/cni-4ea3aab2-42fe-1903-6455-ea0719629ae2" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.043 [INFO][3749] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" iface="eth0" netns="/var/run/netns/cni-4ea3aab2-42fe-1903-6455-ea0719629ae2" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.043 [INFO][3749] k8s.go 585: Releasing IP address(es) ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.043 [INFO][3749] utils.go 188: Calico CNI releasing IP address ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.071 [INFO][3779] ipam_plugin.go 415: Releasing address using handleID ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.071 [INFO][3779] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.071 [INFO][3779] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.076 [WARNING][3779] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.076 [INFO][3779] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.077 [INFO][3779] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:10.079942 env[1153]: 2024-02-12 22:07:10.078 [INFO][3749] k8s.go 591: Teardown processing complete. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:10.080526 env[1153]: time="2024-02-12T22:07:10.080109103Z" level=info msg="TearDown network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" successfully" Feb 12 22:07:10.080526 env[1153]: time="2024-02-12T22:07:10.080133910Z" level=info msg="StopPodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" returns successfully" Feb 12 22:07:10.081021 env[1153]: time="2024-02-12T22:07:10.081007671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ll48v,Uid:a7ff1354-1007-4a30-8f38-4daf767f1c55,Namespace:kube-system,Attempt:1,}" Feb 12 22:07:10.135214 kernel: audit: type=1400 audit(1707775630.125:1255): avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.135296 kernel: audit: type=1400 audit(1707775630.125:1255): avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.135314 kernel: audit: type=1400 audit(1707775630.125:1255): avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.135330 kernel: audit: type=1400 audit(1707775630.125:1255): avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.125000 audit: BPF prog-id=171 op=LOAD Feb 12 22:07:10.125000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff802b0d0 a2=70 a3=7f7102596000 items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.125000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.127000 audit: BPF prog-id=171 op=UNLOAD Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.127000 audit: BPF prog-id=172 op=LOAD Feb 12 22:07:10.127000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff802b0d0 a2=70 a3=6e items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.127000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.132000 audit: BPF prog-id=172 op=UNLOAD Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffff802b080 a2=70 a3=7ffff802b0d0 items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.132000 audit: BPF prog-id=173 op=LOAD Feb 12 22:07:10.132000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffff802b060 a2=70 a3=7ffff802b0d0 items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.135000 audit: BPF prog-id=173 op=UNLOAD Feb 12 22:07:10.135000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.135000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff802b140 a2=70 a3=0 items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.135000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.135000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff802b130 a2=70 a3=0 items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.135000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.135000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffff802b170 a2=70 a3=0 items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.135000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.137000 audit: BPF prog-id=174 op=LOAD Feb 12 22:07:10.137000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffff802b090 a2=70 a3=ffffffff items=0 ppid=3695 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.137000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:07:10.141000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.141000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe336d56d0 a2=70 a3=fff80800 items=0 ppid=3695 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.141000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:07:10.141000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.141000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe336d55a0 a2=70 a3=3 items=0 ppid=3695 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.141000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:07:10.146067 systemd-networkd[1062]: calico_tmp_A: Failed to manage SR-IOV PF and VF ports, ignoring: Invalid argument Feb 12 22:07:10.147000 audit: BPF prog-id=174 op=UNLOAD Feb 12 22:07:10.219000 audit[3854]: NETFILTER_CFG table=raw:103 family=2 entries=19 op=nft_register_chain pid=3854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:10.219000 audit[3854]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc0ad32890 a2=0 a3=7ffc0ad3287c items=0 ppid=3695 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:10.229000 audit[3862]: NETFILTER_CFG table=mangle:104 family=2 entries=19 op=nft_register_chain pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:10.229000 audit[3862]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc95c715b0 a2=0 a3=7ffc95c7159c items=0 ppid=3695 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:10.234000 audit[3857]: NETFILTER_CFG table=nat:105 family=2 entries=16 op=nft_register_chain pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:10.234000 audit[3857]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffded3b41c0 a2=0 a3=56434aff1000 items=0 ppid=3695 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.234000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:10.241000 audit[3856]: NETFILTER_CFG table=filter:106 family=2 entries=97 op=nft_register_chain pid=3856 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:10.241000 audit[3856]: SYSCALL arch=c000003e syscall=46 success=yes exit=52024 a0=3 a1=7ffd4ea3b730 a2=0 a3=56295c476000 items=0 ppid=3695 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.241000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:10.257186 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9efd79abd6f: link becomes ready Feb 12 22:07:10.251757 systemd-networkd[1062]: cali9efd79abd6f: Link UP Feb 12 22:07:10.251841 systemd-networkd[1062]: cali9efd79abd6f: Gained carrier Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.119 [INFO][3788] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--ll48v-eth0 coredns-5dd5756b68- kube-system a7ff1354-1007-4a30-8f38-4daf767f1c55 777 0 2024-02-12 22:06:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-ll48v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9efd79abd6f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.119 [INFO][3788] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.209 [INFO][3817] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" HandleID="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.220 [INFO][3817] ipam_plugin.go 268: Auto assigning IP ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" HandleID="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c5ff0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-ll48v", "timestamp":"2024-02-12 22:07:10.209455914 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.220 [INFO][3817] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.220 [INFO][3817] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.220 [INFO][3817] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.224 [INFO][3817] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.230 [INFO][3817] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.235 [INFO][3817] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.236 [INFO][3817] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.237 [INFO][3817] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.237 [INFO][3817] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.239 [INFO][3817] ipam.go 1682: Creating new handle: k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665 Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.243 [INFO][3817] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.247 [INFO][3817] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.247 [INFO][3817] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" host="localhost" Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.247 [INFO][3817] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:10.267257 env[1153]: 2024-02-12 22:07:10.247 [INFO][3817] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" HandleID="k8s-pod-network.73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.267726 env[1153]: 2024-02-12 22:07:10.249 [INFO][3788] k8s.go 385: Populated endpoint ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ll48v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a7ff1354-1007-4a30-8f38-4daf767f1c55", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-ll48v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9efd79abd6f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:10.267726 env[1153]: 2024-02-12 22:07:10.249 [INFO][3788] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.267726 env[1153]: 2024-02-12 22:07:10.249 [INFO][3788] dataplane_linux.go 68: Setting the host side veth name to cali9efd79abd6f ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.267726 env[1153]: 2024-02-12 22:07:10.250 [INFO][3788] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.267726 env[1153]: 2024-02-12 22:07:10.251 [INFO][3788] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ll48v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a7ff1354-1007-4a30-8f38-4daf767f1c55", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665", Pod:"coredns-5dd5756b68-ll48v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9efd79abd6f", MAC:"72:30:e7:51:b4:6f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:10.267726 env[1153]: 2024-02-12 22:07:10.262 [INFO][3788] k8s.go 491: Wrote updated endpoint to datastore ContainerID="73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665" Namespace="kube-system" Pod="coredns-5dd5756b68-ll48v" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:10.285222 env[1153]: time="2024-02-12T22:07:10.285082033Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:07:10.285222 env[1153]: time="2024-02-12T22:07:10.285112954Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:07:10.285222 env[1153]: time="2024-02-12T22:07:10.285123555Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:07:10.285517 env[1153]: time="2024-02-12T22:07:10.285466914Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665 pid=3881 runtime=io.containerd.runc.v2 Feb 12 22:07:10.316937 systemd[1]: Started cri-containerd-73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665.scope. Feb 12 22:07:10.321481 systemd[1]: run-netns-cni\x2d4ea3aab2\x2d42fe\x2d1903\x2d6455\x2dea0719629ae2.mount: Deactivated successfully. Feb 12 22:07:10.331000 audit[3902]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=3902 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:10.331000 audit[3902]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffdd26aa0e0 a2=0 a3=7ffdd26aa0cc items=0 ppid=3695 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.331000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.334000 audit: BPF prog-id=175 op=LOAD Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3881 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643936666339663034353766396130373533366339326634393734 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3881 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643936666339663034353766396130373533366339326634393734 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit: BPF prog-id=176 op=LOAD Feb 12 22:07:10.335000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000316580 items=0 ppid=3881 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643936666339663034353766396130373533366339326634393734 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit: BPF prog-id=177 op=LOAD Feb 12 22:07:10.335000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003165c8 items=0 ppid=3881 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643936666339663034353766396130373533366339326634393734 Feb 12 22:07:10.335000 audit: BPF prog-id=177 op=UNLOAD Feb 12 22:07:10.335000 audit: BPF prog-id=176 op=UNLOAD Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.335000 audit: BPF prog-id=178 op=LOAD Feb 12 22:07:10.335000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003169d8 items=0 ppid=3881 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643936666339663034353766396130373533366339326634393734 Feb 12 22:07:10.336297 systemd-resolved[1101]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:07:10.363510 env[1153]: time="2024-02-12T22:07:10.363470494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ll48v,Uid:a7ff1354-1007-4a30-8f38-4daf767f1c55,Namespace:kube-system,Attempt:1,} returns sandbox id \"73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665\"" Feb 12 22:07:10.373635 env[1153]: time="2024-02-12T22:07:10.373603315Z" level=info msg="CreateContainer within sandbox \"73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:07:10.433802 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2839059973.mount: Deactivated successfully. Feb 12 22:07:10.455739 env[1153]: time="2024-02-12T22:07:10.455706492Z" level=info msg="CreateContainer within sandbox \"73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b74af572c42e29f1924e80ca38b2f346917f7aedc9a0a38b40f454a447f79e2e\"" Feb 12 22:07:10.456270 env[1153]: time="2024-02-12T22:07:10.456243985Z" level=info msg="StartContainer for \"b74af572c42e29f1924e80ca38b2f346917f7aedc9a0a38b40f454a447f79e2e\"" Feb 12 22:07:10.472434 systemd[1]: Started cri-containerd-b74af572c42e29f1924e80ca38b2f346917f7aedc9a0a38b40f454a447f79e2e.scope. Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit: BPF prog-id=179 op=LOAD Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3881 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346166353732633432653239663139323465383063613338623266 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3881 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346166353732633432653239663139323465383063613338623266 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit: BPF prog-id=180 op=LOAD Feb 12 22:07:10.504000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000249d40 items=0 ppid=3881 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346166353732633432653239663139323465383063613338623266 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.504000 audit: BPF prog-id=181 op=LOAD Feb 12 22:07:10.504000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000249d88 items=0 ppid=3881 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346166353732633432653239663139323465383063613338623266 Feb 12 22:07:10.505000 audit: BPF prog-id=181 op=UNLOAD Feb 12 22:07:10.505000 audit: BPF prog-id=180 op=UNLOAD Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:10.505000 audit: BPF prog-id=182 op=LOAD Feb 12 22:07:10.505000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000398198 items=0 ppid=3881 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:10.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346166353732633432653239663139323465383063613338623266 Feb 12 22:07:10.525988 env[1153]: time="2024-02-12T22:07:10.525934405Z" level=info msg="StartContainer for \"b74af572c42e29f1924e80ca38b2f346917f7aedc9a0a38b40f454a447f79e2e\" returns successfully" Feb 12 22:07:10.637325 systemd-networkd[1062]: cali4a5e2249b65: Gained IPv6LL Feb 12 22:07:10.957311 systemd-networkd[1062]: califebf149117f: Gained IPv6LL Feb 12 22:07:10.979297 systemd-networkd[1062]: vxlan.calico: Link UP Feb 12 22:07:10.979302 systemd-networkd[1062]: vxlan.calico: Gained carrier Feb 12 22:07:11.358000 audit[3963]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=3963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:11.358000 audit[3963]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd974ec560 a2=0 a3=7ffd974ec54c items=0 ppid=2291 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:11.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:11.359000 audit[3963]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:11.359000 audit[3963]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd974ec560 a2=0 a3=31030 items=0 ppid=2291 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:11.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:11.468742 systemd-networkd[1062]: cali9efd79abd6f: Gained IPv6LL Feb 12 22:07:11.472039 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1110614052.mount: Deactivated successfully. Feb 12 22:07:12.236305 env[1153]: time="2024-02-12T22:07:12.236263138Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:12.237086 env[1153]: time="2024-02-12T22:07:12.237063384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:12.238393 env[1153]: time="2024-02-12T22:07:12.238370081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:12.239597 env[1153]: time="2024-02-12T22:07:12.239579395Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:12.242192 env[1153]: time="2024-02-12T22:07:12.242151950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 22:07:12.244248 env[1153]: time="2024-02-12T22:07:12.244223053Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 22:07:12.248888 env[1153]: time="2024-02-12T22:07:12.248863363Z" level=info msg="CreateContainer within sandbox \"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 22:07:12.258052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3834188919.mount: Deactivated successfully. Feb 12 22:07:12.271003 env[1153]: time="2024-02-12T22:07:12.270974657Z" level=info msg="CreateContainer within sandbox \"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1ca56437044dd73f0ceaca2074d541f4229393fba911b097ed078416911022d0\"" Feb 12 22:07:12.271550 env[1153]: time="2024-02-12T22:07:12.271533633Z" level=info msg="StartContainer for \"1ca56437044dd73f0ceaca2074d541f4229393fba911b097ed078416911022d0\"" Feb 12 22:07:12.285271 systemd[1]: Started cri-containerd-1ca56437044dd73f0ceaca2074d541f4229393fba911b097ed078416911022d0.scope. Feb 12 22:07:12.301289 systemd-networkd[1062]: vxlan.calico: Gained IPv6LL Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa32438f038 items=0 ppid=3607 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:12.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613536343337303434646437336630636561636132303734643534 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit: BPF prog-id=183 op=LOAD Feb 12 22:07:12.309000 audit[3972]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003bc3d8 items=0 ppid=3607 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:12.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613536343337303434646437336630636561636132303734643534 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.309000 audit: BPF prog-id=184 op=LOAD Feb 12 22:07:12.309000 audit[3972]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003bc428 items=0 ppid=3607 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:12.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613536343337303434646437336630636561636132303734643534 Feb 12 22:07:12.310000 audit: BPF prog-id=184 op=UNLOAD Feb 12 22:07:12.310000 audit: BPF prog-id=183 op=UNLOAD Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:12.310000 audit: BPF prog-id=185 op=LOAD Feb 12 22:07:12.310000 audit[3972]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003bc4b8 items=0 ppid=3607 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:12.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613536343337303434646437336630636561636132303734643534 Feb 12 22:07:12.317054 kubelet[2131]: I0212 22:07:12.316837 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-ll48v" podStartSLOduration=37.316808132 podCreationTimestamp="2024-02-12 22:06:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:07:11.314068697 +0000 UTC m=+51.387012440" watchObservedRunningTime="2024-02-12 22:07:12.316808132 +0000 UTC m=+52.389751883" Feb 12 22:07:12.352225 env[1153]: time="2024-02-12T22:07:12.352194586Z" level=info msg="StartContainer for \"1ca56437044dd73f0ceaca2074d541f4229393fba911b097ed078416911022d0\" returns successfully" Feb 12 22:07:12.408000 audit[4000]: NETFILTER_CFG table=filter:110 family=2 entries=11 op=nft_register_rule pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:12.408000 audit[4000]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff88fce5f0 a2=0 a3=7fff88fce5dc items=0 ppid=2291 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:12.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:12.409000 audit[4000]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:12.409000 audit[4000]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff88fce5f0 a2=0 a3=7fff88fce5dc items=0 ppid=2291 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:12.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:12.997954 env[1153]: time="2024-02-12T22:07:12.997929998Z" level=info msg="StopPodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\"" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.027 [INFO][4015] k8s.go 578: Cleaning up netns ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.027 [INFO][4015] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" iface="eth0" netns="/var/run/netns/cni-51914a76-b6c6-cf35-b446-034f614a004a" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.027 [INFO][4015] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" iface="eth0" netns="/var/run/netns/cni-51914a76-b6c6-cf35-b446-034f614a004a" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.027 [INFO][4015] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" iface="eth0" netns="/var/run/netns/cni-51914a76-b6c6-cf35-b446-034f614a004a" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.027 [INFO][4015] k8s.go 585: Releasing IP address(es) ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.027 [INFO][4015] utils.go 188: Calico CNI releasing IP address ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.048 [INFO][4022] ipam_plugin.go 415: Releasing address using handleID ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.048 [INFO][4022] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.048 [INFO][4022] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.053 [WARNING][4022] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.053 [INFO][4022] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.066 [INFO][4022] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:13.068185 env[1153]: 2024-02-12 22:07:13.067 [INFO][4015] k8s.go 591: Teardown processing complete. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:13.069834 systemd[1]: run-netns-cni\x2d51914a76\x2db6c6\x2dcf35\x2db446\x2d034f614a004a.mount: Deactivated successfully. Feb 12 22:07:13.070909 env[1153]: time="2024-02-12T22:07:13.070886687Z" level=info msg="TearDown network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" successfully" Feb 12 22:07:13.070967 env[1153]: time="2024-02-12T22:07:13.070955980Z" level=info msg="StopPodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" returns successfully" Feb 12 22:07:13.071432 env[1153]: time="2024-02-12T22:07:13.071419860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qpqf4,Uid:632a11c2-55e9-4240-ae20-d43bedff425d,Namespace:kube-system,Attempt:1,}" Feb 12 22:07:13.360228 systemd-networkd[1062]: cali1ef4f682df6: Link UP Feb 12 22:07:13.362547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:07:13.362592 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ef4f682df6: link becomes ready Feb 12 22:07:13.362547 systemd-networkd[1062]: cali1ef4f682df6: Gained carrier Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.167 [INFO][4028] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--qpqf4-eth0 coredns-5dd5756b68- kube-system 632a11c2-55e9-4240-ae20-d43bedff425d 802 0 2024-02-12 22:06:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-qpqf4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1ef4f682df6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.167 [INFO][4028] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.182 [INFO][4040] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" HandleID="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.189 [INFO][4040] ipam_plugin.go 268: Auto assigning IP ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" HandleID="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-qpqf4", "timestamp":"2024-02-12 22:07:13.182721232 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.338 [INFO][4040] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.338 [INFO][4040] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.338 [INFO][4040] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.339 [INFO][4040] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.342 [INFO][4040] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.344 [INFO][4040] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.345 [INFO][4040] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.346 [INFO][4040] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.346 [INFO][4040] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.347 [INFO][4040] ipam.go 1682: Creating new handle: k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.349 [INFO][4040] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.355 [INFO][4040] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.355 [INFO][4040] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" host="localhost" Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.355 [INFO][4040] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:13.376585 env[1153]: 2024-02-12 22:07:13.355 [INFO][4040] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" HandleID="k8s-pod-network.fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.391038 env[1153]: 2024-02-12 22:07:13.356 [INFO][4028] k8s.go 385: Populated endpoint ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--qpqf4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"632a11c2-55e9-4240-ae20-d43bedff425d", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-qpqf4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef4f682df6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:13.391038 env[1153]: 2024-02-12 22:07:13.357 [INFO][4028] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.391038 env[1153]: 2024-02-12 22:07:13.357 [INFO][4028] dataplane_linux.go 68: Setting the host side veth name to cali1ef4f682df6 ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.391038 env[1153]: 2024-02-12 22:07:13.362 [INFO][4028] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.391038 env[1153]: 2024-02-12 22:07:13.363 [INFO][4028] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--qpqf4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"632a11c2-55e9-4240-ae20-d43bedff425d", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f", Pod:"coredns-5dd5756b68-qpqf4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef4f682df6", MAC:"d6:08:8e:30:f0:d7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:13.391038 env[1153]: 2024-02-12 22:07:13.375 [INFO][4028] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f" Namespace="kube-system" Pod="coredns-5dd5756b68-qpqf4" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:13.395950 kubelet[2131]: I0212 22:07:13.391601 2131 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:07:13.410736 env[1153]: time="2024-02-12T22:07:13.410688941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:07:13.410736 env[1153]: time="2024-02-12T22:07:13.410714509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:07:13.410736 env[1153]: time="2024-02-12T22:07:13.410721467Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:07:13.411267 env[1153]: time="2024-02-12T22:07:13.411045026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f pid=4063 runtime=io.containerd.runc.v2 Feb 12 22:07:13.429832 systemd[1]: Started cri-containerd-fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f.scope. Feb 12 22:07:13.436764 systemd[1]: run-containerd-runc-k8s.io-fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f-runc.OwSLuq.mount: Deactivated successfully. Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.448000 audit: BPF prog-id=186 op=LOAD Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366337313732333636333937356465366536626636313563383865 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366337313732333636333937356465366536626636313563383865 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit: BPF prog-id=187 op=LOAD Feb 12 22:07:13.449000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd10 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366337313732333636333937356465366536626636313563383865 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit: BPF prog-id=188 op=LOAD Feb 12 22:07:13.449000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd58 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366337313732333636333937356465366536626636313563383865 Feb 12 22:07:13.449000 audit: BPF prog-id=188 op=UNLOAD Feb 12 22:07:13.449000 audit: BPF prog-id=187 op=UNLOAD Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.449000 audit: BPF prog-id=189 op=LOAD Feb 12 22:07:13.449000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ae168 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366337313732333636333937356465366536626636313563383865 Feb 12 22:07:13.451066 systemd-resolved[1101]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:07:13.475501 env[1153]: time="2024-02-12T22:07:13.475472790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qpqf4,Uid:632a11c2-55e9-4240-ae20-d43bedff425d,Namespace:kube-system,Attempt:1,} returns sandbox id \"fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f\"" Feb 12 22:07:13.492194 env[1153]: time="2024-02-12T22:07:13.492161581Z" level=info msg="CreateContainer within sandbox \"fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:07:13.502495 env[1153]: time="2024-02-12T22:07:13.502457751Z" level=info msg="CreateContainer within sandbox \"fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d134d8ac0ae8dc7a777fc1efbb2103a2af87bc3edcf95b8e413fff11e4e9688f\"" Feb 12 22:07:13.503072 env[1153]: time="2024-02-12T22:07:13.503044781Z" level=info msg="StartContainer for \"d134d8ac0ae8dc7a777fc1efbb2103a2af87bc3edcf95b8e413fff11e4e9688f\"" Feb 12 22:07:13.507000 audit[4123]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:13.507000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffc299de4f0 a2=0 a3=7ffc299de4dc items=0 ppid=3695 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.507000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:13.515792 systemd[1]: Started cri-containerd-d134d8ac0ae8dc7a777fc1efbb2103a2af87bc3edcf95b8e413fff11e4e9688f.scope. Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.521000 audit: BPF prog-id=190 op=LOAD Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4063 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333464386163306165386463376137373766633165666262323130 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4063 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333464386163306165386463376137373766633165666262323130 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.522000 audit: BPF prog-id=191 op=LOAD Feb 12 22:07:13.522000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000290820 items=0 ppid=4063 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333464386163306165386463376137373766633165666262323130 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit: BPF prog-id=192 op=LOAD Feb 12 22:07:13.523000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000290868 items=0 ppid=4063 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333464386163306165386463376137373766633165666262323130 Feb 12 22:07:13.523000 audit: BPF prog-id=192 op=UNLOAD Feb 12 22:07:13.523000 audit: BPF prog-id=191 op=UNLOAD Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:13.523000 audit: BPF prog-id=193 op=LOAD Feb 12 22:07:13.523000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000290c78 items=0 ppid=4063 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:13.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333464386163306165386463376137373766633165666262323130 Feb 12 22:07:13.532672 env[1153]: time="2024-02-12T22:07:13.532647225Z" level=info msg="StartContainer for \"d134d8ac0ae8dc7a777fc1efbb2103a2af87bc3edcf95b8e413fff11e4e9688f\" returns successfully" Feb 12 22:07:14.354222 kubelet[2131]: I0212 22:07:14.354198 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-qpqf4" podStartSLOduration=39.354151707 podCreationTimestamp="2024-02-12 22:06:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:07:14.336067219 +0000 UTC m=+54.409010973" watchObservedRunningTime="2024-02-12 22:07:14.354151707 +0000 UTC m=+54.427095454" Feb 12 22:07:14.355000 audit[4190]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:14.355000 audit[4190]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe5e4d0de0 a2=0 a3=7ffe5e4d0dcc items=0 ppid=2291 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:14.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:14.356000 audit[4190]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:14.356000 audit[4190]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe5e4d0de0 a2=0 a3=7ffe5e4d0dcc items=0 ppid=2291 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:14.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:14.396000 audit[4192]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:14.396000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff0e4a2b40 a2=0 a3=7fff0e4a2b2c items=0 ppid=2291 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:14.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:14.413543 systemd[1]: run-containerd-runc-k8s.io-26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298-runc.kYD6Df.mount: Deactivated successfully. Feb 12 22:07:14.447000 audit[4192]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:14.447000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff0e4a2b40 a2=0 a3=7fff0e4a2b2c items=0 ppid=2291 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:14.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:14.924264 systemd-networkd[1062]: cali1ef4f682df6: Gained IPv6LL Feb 12 22:07:16.355357 env[1153]: time="2024-02-12T22:07:16.355307084Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:16.356551 env[1153]: time="2024-02-12T22:07:16.356534381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:16.358033 env[1153]: time="2024-02-12T22:07:16.357996866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:16.361196 env[1153]: time="2024-02-12T22:07:16.361163647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:16.361829 env[1153]: time="2024-02-12T22:07:16.361809505Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 22:07:16.363802 env[1153]: time="2024-02-12T22:07:16.363785306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 22:07:16.375137 env[1153]: time="2024-02-12T22:07:16.375107722Z" level=info msg="CreateContainer within sandbox \"930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 22:07:16.381936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1323392356.mount: Deactivated successfully. Feb 12 22:07:16.383619 env[1153]: time="2024-02-12T22:07:16.383592200Z" level=info msg="CreateContainer within sandbox \"930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145\"" Feb 12 22:07:16.384928 env[1153]: time="2024-02-12T22:07:16.384032685Z" level=info msg="StartContainer for \"3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145\"" Feb 12 22:07:16.397495 systemd[1]: Started cri-containerd-3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145.scope. Feb 12 22:07:16.419191 kernel: kauditd_printk_skb: 380 callbacks suppressed Feb 12 22:07:16.419259 kernel: audit: type=1400 audit(1707775636.414:1361): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.421676 kernel: audit: type=1400 audit(1707775636.414:1362): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.429149 kernel: audit: type=1400 audit(1707775636.414:1363): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.429220 kernel: audit: type=1400 audit(1707775636.414:1364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.429240 kernel: audit: type=1400 audit(1707775636.414:1365): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.434126 kernel: audit: type=1400 audit(1707775636.414:1366): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.437268 kernel: audit: type=1400 audit(1707775636.414:1367): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.442414 kernel: audit: type=1400 audit(1707775636.414:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.442457 kernel: audit: type=1400 audit(1707775636.414:1369): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.442474 kernel: audit: type=1400 audit(1707775636.418:1370): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit: BPF prog-id=194 op=LOAD Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3652 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:16.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323964343235366338346332313530373030386366626262623666 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3652 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:16.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323964343235366338346332313530373030386366626262623666 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.418000 audit: BPF prog-id=195 op=LOAD Feb 12 22:07:16.418000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b49d0 items=0 ppid=3652 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:16.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323964343235366338346332313530373030386366626262623666 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit: BPF prog-id=196 op=LOAD Feb 12 22:07:16.420000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b4a18 items=0 ppid=3652 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:16.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323964343235366338346332313530373030386366626262623666 Feb 12 22:07:16.420000 audit: BPF prog-id=196 op=UNLOAD Feb 12 22:07:16.420000 audit: BPF prog-id=195 op=UNLOAD Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { perfmon } for pid=4210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit[4210]: AVC avc: denied { bpf } for pid=4210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:16.420000 audit: BPF prog-id=197 op=LOAD Feb 12 22:07:16.420000 audit[4210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b4e28 items=0 ppid=3652 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:16.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323964343235366338346332313530373030386366626262623666 Feb 12 22:07:16.461737 env[1153]: time="2024-02-12T22:07:16.461709110Z" level=info msg="StartContainer for \"3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145\" returns successfully" Feb 12 22:07:16.948000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:16.948000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000aee700 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:16.948000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:16.949000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:16.949000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000efbb30 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:16.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:17.386249 kubelet[2131]: I0212 22:07:17.385978 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6cdd45c5cd-74d55" podStartSLOduration=30.609644044 podCreationTimestamp="2024-02-12 22:06:40 +0000 UTC" firstStartedPulling="2024-02-12 22:07:09.586364777 +0000 UTC m=+49.659308522" lastFinishedPulling="2024-02-12 22:07:16.362671662 +0000 UTC m=+56.435615407" observedRunningTime="2024-02-12 22:07:17.341433939 +0000 UTC m=+57.414377694" watchObservedRunningTime="2024-02-12 22:07:17.385950929 +0000 UTC m=+57.458894678" Feb 12 22:07:17.452000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:17.452000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:17.452000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0076cd890 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:07:17.452000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:07:17.452000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c000eb30e0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:07:17.452000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:07:17.452000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:17.452000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006db00e0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:07:17.452000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:07:17.455000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:17.455000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0076cd8f0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:07:17.455000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:07:17.456000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:17.456000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007a3a0c0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:07:17.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:07:17.456000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:17.456000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c000eb3650 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:07:17.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:07:18.357803 env[1153]: time="2024-02-12T22:07:18.357470804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:18.366548 env[1153]: time="2024-02-12T22:07:18.366523299Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:18.370189 env[1153]: time="2024-02-12T22:07:18.370162651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:18.375771 env[1153]: time="2024-02-12T22:07:18.375748853Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:18.376064 env[1153]: time="2024-02-12T22:07:18.376044903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 22:07:18.382844 env[1153]: time="2024-02-12T22:07:18.377450806Z" level=info msg="CreateContainer within sandbox \"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 22:07:18.496616 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3598353150.mount: Deactivated successfully. Feb 12 22:07:18.502997 env[1153]: time="2024-02-12T22:07:18.502967121Z" level=info msg="CreateContainer within sandbox \"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ba7bf43a8de22f7a6e46511c9b896a9e0e7566f5ce3b3bae87c00e5edd7bec58\"" Feb 12 22:07:18.503355 env[1153]: time="2024-02-12T22:07:18.503342794Z" level=info msg="StartContainer for \"ba7bf43a8de22f7a6e46511c9b896a9e0e7566f5ce3b3bae87c00e5edd7bec58\"" Feb 12 22:07:18.517046 systemd[1]: Started cri-containerd-ba7bf43a8de22f7a6e46511c9b896a9e0e7566f5ce3b3bae87c00e5edd7bec58.scope. Feb 12 22:07:18.538000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.538000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa9ae0ee8c8 items=0 ppid=3607 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:18.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376266343361386465323266376136653436353131633962383936 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit: BPF prog-id=198 op=LOAD Feb 12 22:07:18.539000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000284f68 items=0 ppid=3607 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:18.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376266343361386465323266376136653436353131633962383936 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.539000 audit: BPF prog-id=199 op=LOAD Feb 12 22:07:18.539000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000284fb8 items=0 ppid=3607 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:18.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376266343361386465323266376136653436353131633962383936 Feb 12 22:07:18.540000 audit: BPF prog-id=199 op=UNLOAD Feb 12 22:07:18.540000 audit: BPF prog-id=198 op=UNLOAD Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:18.540000 audit: BPF prog-id=200 op=LOAD Feb 12 22:07:18.540000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000285048 items=0 ppid=3607 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:18.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376266343361386465323266376136653436353131633962383936 Feb 12 22:07:18.560221 env[1153]: time="2024-02-12T22:07:18.560196291Z" level=info msg="StartContainer for \"ba7bf43a8de22f7a6e46511c9b896a9e0e7566f5ce3b3bae87c00e5edd7bec58\" returns successfully" Feb 12 22:07:19.133212 kubelet[2131]: I0212 22:07:19.133187 2131 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 22:07:19.134360 kubelet[2131]: I0212 22:07:19.134349 2131 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 22:07:19.892000 audit[4302]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:19.892000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdc0454430 a2=0 a3=7ffdc045441c items=0 ppid=2291 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:19.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:19.893000 audit[4302]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:19.893000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdc0454430 a2=0 a3=7ffdc045441c items=0 ppid=2291 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:19.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:19.902000 audit[4304]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:19.902000 audit[4304]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd77f628d0 a2=0 a3=7ffd77f628bc items=0 ppid=2291 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:19.902000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:19.903000 audit[4304]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:19.903000 audit[4304]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd77f628d0 a2=0 a3=7ffd77f628bc items=0 ppid=2291 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:19.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:19.935340 kubelet[2131]: I0212 22:07:19.935305 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-ssbfr" podStartSLOduration=32.107119014 podCreationTimestamp="2024-02-12 22:06:39 +0000 UTC" firstStartedPulling="2024-02-12 22:07:09.548378198 +0000 UTC m=+49.621321940" lastFinishedPulling="2024-02-12 22:07:18.376519493 +0000 UTC m=+58.449463238" observedRunningTime="2024-02-12 22:07:19.362226437 +0000 UTC m=+59.435170187" watchObservedRunningTime="2024-02-12 22:07:19.935260312 +0000 UTC m=+60.008204062" Feb 12 22:07:19.935815 kubelet[2131]: I0212 22:07:19.935802 2131 topology_manager.go:215] "Topology Admit Handler" podUID="414aaf26-259f-4c95-aa3e-7608912fc043" podNamespace="calico-apiserver" podName="calico-apiserver-dc7885668-fbht9" Feb 12 22:07:19.937927 kubelet[2131]: I0212 22:07:19.937901 2131 topology_manager.go:215] "Topology Admit Handler" podUID="e5ec5d4a-4337-4576-9c28-bbdb4731473b" podNamespace="calico-apiserver" podName="calico-apiserver-dc7885668-6869z" Feb 12 22:07:19.945421 systemd[1]: Created slice kubepods-besteffort-pod414aaf26_259f_4c95_aa3e_7608912fc043.slice. Feb 12 22:07:19.959576 systemd[1]: Created slice kubepods-besteffort-pode5ec5d4a_4337_4576_9c28_bbdb4731473b.slice. Feb 12 22:07:20.031161 kubelet[2131]: I0212 22:07:20.031137 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qxpss\" (UniqueName: \"kubernetes.io/projected/414aaf26-259f-4c95-aa3e-7608912fc043-kube-api-access-qxpss\") pod \"calico-apiserver-dc7885668-fbht9\" (UID: \"414aaf26-259f-4c95-aa3e-7608912fc043\") " pod="calico-apiserver/calico-apiserver-dc7885668-fbht9" Feb 12 22:07:20.031285 kubelet[2131]: I0212 22:07:20.031186 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/414aaf26-259f-4c95-aa3e-7608912fc043-calico-apiserver-certs\") pod \"calico-apiserver-dc7885668-fbht9\" (UID: \"414aaf26-259f-4c95-aa3e-7608912fc043\") " pod="calico-apiserver/calico-apiserver-dc7885668-fbht9" Feb 12 22:07:20.031285 kubelet[2131]: I0212 22:07:20.031219 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rn9fb\" (UniqueName: \"kubernetes.io/projected/e5ec5d4a-4337-4576-9c28-bbdb4731473b-kube-api-access-rn9fb\") pod \"calico-apiserver-dc7885668-6869z\" (UID: \"e5ec5d4a-4337-4576-9c28-bbdb4731473b\") " pod="calico-apiserver/calico-apiserver-dc7885668-6869z" Feb 12 22:07:20.031285 kubelet[2131]: I0212 22:07:20.031241 2131 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e5ec5d4a-4337-4576-9c28-bbdb4731473b-calico-apiserver-certs\") pod \"calico-apiserver-dc7885668-6869z\" (UID: \"e5ec5d4a-4337-4576-9c28-bbdb4731473b\") " pod="calico-apiserver/calico-apiserver-dc7885668-6869z" Feb 12 22:07:20.052632 env[1153]: time="2024-02-12T22:07:20.052527740Z" level=info msg="StopPodSandbox for \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\"" Feb 12 22:07:20.052632 env[1153]: time="2024-02-12T22:07:20.052582686Z" level=info msg="TearDown network for sandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" successfully" Feb 12 22:07:20.052632 env[1153]: time="2024-02-12T22:07:20.052602966Z" level=info msg="StopPodSandbox for \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" returns successfully" Feb 12 22:07:20.054890 env[1153]: time="2024-02-12T22:07:20.054418784Z" level=info msg="RemovePodSandbox for \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\"" Feb 12 22:07:20.054890 env[1153]: time="2024-02-12T22:07:20.054439865Z" level=info msg="Forcibly stopping sandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\"" Feb 12 22:07:20.054890 env[1153]: time="2024-02-12T22:07:20.054486387Z" level=info msg="TearDown network for sandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" successfully" Feb 12 22:07:20.067152 env[1153]: time="2024-02-12T22:07:20.067043096Z" level=info msg="RemovePodSandbox \"0ded9f06501c196ff2282ba4968620db82fcf7761515f15af38e10308d320a57\" returns successfully" Feb 12 22:07:20.067532 env[1153]: time="2024-02-12T22:07:20.067432630Z" level=info msg="StopPodSandbox for \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\"" Feb 12 22:07:20.067532 env[1153]: time="2024-02-12T22:07:20.067482976Z" level=info msg="TearDown network for sandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" successfully" Feb 12 22:07:20.067532 env[1153]: time="2024-02-12T22:07:20.067504231Z" level=info msg="StopPodSandbox for \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" returns successfully" Feb 12 22:07:20.067663 env[1153]: time="2024-02-12T22:07:20.067646969Z" level=info msg="RemovePodSandbox for \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\"" Feb 12 22:07:20.067711 env[1153]: time="2024-02-12T22:07:20.067664431Z" level=info msg="Forcibly stopping sandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\"" Feb 12 22:07:20.067749 env[1153]: time="2024-02-12T22:07:20.067718224Z" level=info msg="TearDown network for sandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" successfully" Feb 12 22:07:20.080618 env[1153]: time="2024-02-12T22:07:20.080580203Z" level=info msg="RemovePodSandbox \"47f6e91cdf3949a21dff49f2f32d49c01d529135f8414c99bd8828349430564e\" returns successfully" Feb 12 22:07:20.081162 env[1153]: time="2024-02-12T22:07:20.080963346Z" level=info msg="StopPodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\"" Feb 12 22:07:20.250429 env[1153]: time="2024-02-12T22:07:20.250358073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-dc7885668-fbht9,Uid:414aaf26-259f-4c95-aa3e-7608912fc043,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:07:20.272571 env[1153]: time="2024-02-12T22:07:20.272369171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-dc7885668-6869z,Uid:e5ec5d4a-4337-4576-9c28-bbdb4731473b,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.245 [WARNING][4322] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ssbfr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4db62a6-5db0-4596-b7c7-a5483034a42b", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b", Pod:"csi-node-driver-ssbfr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califebf149117f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.246 [INFO][4322] k8s.go 578: Cleaning up netns ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.246 [INFO][4322] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" iface="eth0" netns="" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.246 [INFO][4322] k8s.go 585: Releasing IP address(es) ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.246 [INFO][4322] utils.go 188: Calico CNI releasing IP address ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.299 [INFO][4336] ipam_plugin.go 415: Releasing address using handleID ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.299 [INFO][4336] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.299 [INFO][4336] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.305 [WARNING][4336] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.306 [INFO][4336] ipam_plugin.go 443: Releasing address using workloadID ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.308 [INFO][4336] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.322303 env[1153]: 2024-02-12 22:07:20.320 [INFO][4322] k8s.go 591: Teardown processing complete. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.322728 env[1153]: time="2024-02-12T22:07:20.322704211Z" level=info msg="TearDown network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" successfully" Feb 12 22:07:20.322791 env[1153]: time="2024-02-12T22:07:20.322779588Z" level=info msg="StopPodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" returns successfully" Feb 12 22:07:20.323295 env[1153]: time="2024-02-12T22:07:20.323281706Z" level=info msg="RemovePodSandbox for \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\"" Feb 12 22:07:20.323378 env[1153]: time="2024-02-12T22:07:20.323353508Z" level=info msg="Forcibly stopping sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\"" Feb 12 22:07:20.428693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:07:20.428763 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0dfad3fcf0: link becomes ready Feb 12 22:07:20.426791 systemd-networkd[1062]: calib0dfad3fcf0: Link UP Feb 12 22:07:20.427753 systemd-networkd[1062]: calib0dfad3fcf0: Gained carrier Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.320 [INFO][4343] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0 calico-apiserver-dc7885668- calico-apiserver 414aaf26-259f-4c95-aa3e-7608912fc043 900 0 2024-02-12 22:07:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:dc7885668 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-dc7885668-fbht9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib0dfad3fcf0 [] []}} ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.320 [INFO][4343] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.375 [INFO][4374] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" HandleID="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Workload="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.383 [INFO][4374] ipam_plugin.go 268: Auto assigning IP ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" HandleID="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Workload="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024e720), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-dc7885668-fbht9", "timestamp":"2024-02-12 22:07:20.375405952 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.383 [INFO][4374] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.383 [INFO][4374] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.383 [INFO][4374] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.384 [INFO][4374] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.387 [INFO][4374] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.400 [INFO][4374] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.402 [INFO][4374] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.404 [INFO][4374] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.404 [INFO][4374] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.406 [INFO][4374] ipam.go 1682: Creating new handle: k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8 Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.410 [INFO][4374] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.417 [INFO][4374] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.417 [INFO][4374] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" host="localhost" Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.417 [INFO][4374] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.442695 env[1153]: 2024-02-12 22:07:20.417 [INFO][4374] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" HandleID="k8s-pod-network.727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Workload="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.450545 env[1153]: 2024-02-12 22:07:20.421 [INFO][4343] k8s.go 385: Populated endpoint ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0", GenerateName:"calico-apiserver-dc7885668-", Namespace:"calico-apiserver", SelfLink:"", UID:"414aaf26-259f-4c95-aa3e-7608912fc043", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 7, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"dc7885668", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-dc7885668-fbht9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib0dfad3fcf0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.450545 env[1153]: 2024-02-12 22:07:20.421 [INFO][4343] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.450545 env[1153]: 2024-02-12 22:07:20.421 [INFO][4343] dataplane_linux.go 68: Setting the host side veth name to calib0dfad3fcf0 ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.450545 env[1153]: 2024-02-12 22:07:20.429 [INFO][4343] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.450545 env[1153]: 2024-02-12 22:07:20.429 [INFO][4343] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0", GenerateName:"calico-apiserver-dc7885668-", Namespace:"calico-apiserver", SelfLink:"", UID:"414aaf26-259f-4c95-aa3e-7608912fc043", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 7, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"dc7885668", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8", Pod:"calico-apiserver-dc7885668-fbht9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib0dfad3fcf0", MAC:"26:c1:2f:0f:76:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.450545 env[1153]: 2024-02-12 22:07:20.440 [INFO][4343] k8s.go 491: Wrote updated endpoint to datastore ContainerID="727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-fbht9" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--fbht9-eth0" Feb 12 22:07:20.476554 env[1153]: time="2024-02-12T22:07:20.476505733Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:07:20.476698 env[1153]: time="2024-02-12T22:07:20.476681905Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:07:20.478258 env[1153]: time="2024-02-12T22:07:20.476904695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:07:20.478258 env[1153]: time="2024-02-12T22:07:20.477024742Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8 pid=4427 runtime=io.containerd.runc.v2 Feb 12 22:07:20.497316 systemd-networkd[1062]: cali6ed323ab316: Link UP Feb 12 22:07:20.500098 systemd-networkd[1062]: cali6ed323ab316: Gained carrier Feb 12 22:07:20.500217 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ed323ab316: link becomes ready Feb 12 22:07:20.505600 systemd[1]: Started cri-containerd-727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8.scope. Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.355 [INFO][4354] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--dc7885668--6869z-eth0 calico-apiserver-dc7885668- calico-apiserver e5ec5d4a-4337-4576-9c28-bbdb4731473b 902 0 2024-02-12 22:07:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:dc7885668 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-dc7885668-6869z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6ed323ab316 [] []}} ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.355 [INFO][4354] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.395 [INFO][4388] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" HandleID="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Workload="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.406 [INFO][4388] ipam_plugin.go 268: Auto assigning IP ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" HandleID="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Workload="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d9b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-dc7885668-6869z", "timestamp":"2024-02-12 22:07:20.395304332 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.406 [INFO][4388] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.417 [INFO][4388] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.417 [INFO][4388] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.421 [INFO][4388] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.472 [INFO][4388] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.476 [INFO][4388] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.477 [INFO][4388] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.479 [INFO][4388] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.479 [INFO][4388] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.480 [INFO][4388] ipam.go 1682: Creating new handle: k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782 Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.485 [INFO][4388] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.490 [INFO][4388] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.490 [INFO][4388] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" host="localhost" Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.490 [INFO][4388] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.518744 env[1153]: 2024-02-12 22:07:20.490 [INFO][4388] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" HandleID="k8s-pod-network.ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Workload="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.527883 env[1153]: 2024-02-12 22:07:20.494 [INFO][4354] k8s.go 385: Populated endpoint ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--dc7885668--6869z-eth0", GenerateName:"calico-apiserver-dc7885668-", Namespace:"calico-apiserver", SelfLink:"", UID:"e5ec5d4a-4337-4576-9c28-bbdb4731473b", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 7, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"dc7885668", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-dc7885668-6869z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6ed323ab316", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.527883 env[1153]: 2024-02-12 22:07:20.495 [INFO][4354] k8s.go 386: Calico CNI using IPs: [192.168.88.134/32] ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.527883 env[1153]: 2024-02-12 22:07:20.495 [INFO][4354] dataplane_linux.go 68: Setting the host side veth name to cali6ed323ab316 ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.527883 env[1153]: 2024-02-12 22:07:20.502 [INFO][4354] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.527883 env[1153]: 2024-02-12 22:07:20.509 [INFO][4354] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--dc7885668--6869z-eth0", GenerateName:"calico-apiserver-dc7885668-", Namespace:"calico-apiserver", SelfLink:"", UID:"e5ec5d4a-4337-4576-9c28-bbdb4731473b", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 7, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"dc7885668", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782", Pod:"calico-apiserver-dc7885668-6869z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6ed323ab316", MAC:"1a:11:92:aa:25:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.527883 env[1153]: 2024-02-12 22:07:20.517 [INFO][4354] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782" Namespace="calico-apiserver" Pod="calico-apiserver-dc7885668-6869z" WorkloadEndpoint="localhost-k8s-calico--apiserver--dc7885668--6869z-eth0" Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit: BPF prog-id=201 op=LOAD Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4427 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732376637313639303164373830366430656365306636363263373233 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4427 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732376637313639303164373830366430656365306636363263373233 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.534000 audit: BPF prog-id=202 op=LOAD Feb 12 22:07:20.534000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003108f0 items=0 ppid=4427 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732376637313639303164373830366430656365306636363263373233 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit: BPF prog-id=203 op=LOAD Feb 12 22:07:20.535000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000310938 items=0 ppid=4427 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732376637313639303164373830366430656365306636363263373233 Feb 12 22:07:20.535000 audit: BPF prog-id=203 op=UNLOAD Feb 12 22:07:20.535000 audit: BPF prog-id=202 op=UNLOAD Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.535000 audit: BPF prog-id=204 op=LOAD Feb 12 22:07:20.535000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000310d48 items=0 ppid=4427 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732376637313639303164373830366430656365306636363263373233 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit: BPF prog-id=205 op=LOAD Feb 12 22:07:20.574000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4471 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363666663376238643634383165663463633162396239393135643031 Feb 12 22:07:20.574000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.574000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4471 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363666663376238643634383165663463633162396239393135643031 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit: BPF prog-id=206 op=LOAD Feb 12 22:07:20.575000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000298cb0 items=0 ppid=4471 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363666663376238643634383165663463633162396239393135643031 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit: BPF prog-id=207 op=LOAD Feb 12 22:07:20.575000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000298cf8 items=0 ppid=4471 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363666663376238643634383165663463633162396239393135643031 Feb 12 22:07:20.575000 audit: BPF prog-id=207 op=UNLOAD Feb 12 22:07:20.575000 audit: BPF prog-id=206 op=UNLOAD Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:20.575000 audit: BPF prog-id=208 op=LOAD Feb 12 22:07:20.575000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000299108 items=0 ppid=4471 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363666663376238643634383165663463633162396239393135643031 Feb 12 22:07:20.596000 audit[4527]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=4527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:20.596000 audit[4527]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffc80657720 a2=0 a3=7ffc8065770c items=0 ppid=3695 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.596000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:20.609000 audit[4539]: NETFILTER_CFG table=filter:122 family=2 entries=50 op=nft_register_chain pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:07:20.609000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7ffe0fbf6610 a2=0 a3=7ffe0fbf65fc items=0 ppid=3695 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:20.609000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:07:20.537123 systemd-resolved[1101]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.414 [WARNING][4392] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--ssbfr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4db62a6-5db0-4596-b7c7-a5483034a42b", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4f74e02fed6d2ea95411f0a450f94b2d350388dbb37288861e918a84a970302b", Pod:"csi-node-driver-ssbfr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califebf149117f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.416 [INFO][4392] k8s.go 578: Cleaning up netns ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.416 [INFO][4392] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" iface="eth0" netns="" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.416 [INFO][4392] k8s.go 585: Releasing IP address(es) ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.416 [INFO][4392] utils.go 188: Calico CNI releasing IP address ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.446 [INFO][4402] ipam_plugin.go 415: Releasing address using handleID ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.446 [INFO][4402] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.490 [INFO][4402] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.522 [WARNING][4402] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.522 [INFO][4402] ipam_plugin.go 443: Releasing address using workloadID ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" HandleID="k8s-pod-network.09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Workload="localhost-k8s-csi--node--driver--ssbfr-eth0" Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.523 [INFO][4402] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.638409 env[1153]: 2024-02-12 22:07:20.525 [INFO][4392] k8s.go 591: Teardown processing complete. ContainerID="09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44" Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.526822999Z" level=info msg="TearDown network for sandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" successfully" Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.536505072Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.536548580Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.536562397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.536672982Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782 pid=4471 runtime=io.containerd.runc.v2 Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.557628954Z" level=info msg="RemovePodSandbox \"09aad07b7b8d25491cde07c2f414bd4e53db39b16af52e4880aff70cc10e1d44\" returns successfully" Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.558483169Z" level=info msg="StopPodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\"" Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.586430637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-dc7885668-fbht9,Uid:414aaf26-259f-4c95-aa3e-7608912fc043,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8\"" Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.587600087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:07:20.638409 env[1153]: time="2024-02-12T22:07:20.608139298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-dc7885668-6869z,Uid:e5ec5d4a-4337-4576-9c28-bbdb4731473b,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782\"" Feb 12 22:07:20.548322 systemd[1]: Started cri-containerd-ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782.scope. Feb 12 22:07:20.578776 systemd-resolved[1101]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.650 [WARNING][4508] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--qpqf4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"632a11c2-55e9-4240-ae20-d43bedff425d", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f", Pod:"coredns-5dd5756b68-qpqf4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef4f682df6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.650 [INFO][4508] k8s.go 578: Cleaning up netns ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.650 [INFO][4508] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" iface="eth0" netns="" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.650 [INFO][4508] k8s.go 585: Releasing IP address(es) ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.650 [INFO][4508] utils.go 188: Calico CNI releasing IP address ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.696 [INFO][4542] ipam_plugin.go 415: Releasing address using handleID ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.696 [INFO][4542] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.696 [INFO][4542] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.710 [WARNING][4542] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.710 [INFO][4542] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.711 [INFO][4542] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.714055 env[1153]: 2024-02-12 22:07:20.712 [INFO][4508] k8s.go 591: Teardown processing complete. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.723308 env[1153]: time="2024-02-12T22:07:20.714348260Z" level=info msg="TearDown network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" successfully" Feb 12 22:07:20.723308 env[1153]: time="2024-02-12T22:07:20.714368278Z" level=info msg="StopPodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" returns successfully" Feb 12 22:07:20.723308 env[1153]: time="2024-02-12T22:07:20.714678662Z" level=info msg="RemovePodSandbox for \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\"" Feb 12 22:07:20.723308 env[1153]: time="2024-02-12T22:07:20.714695589Z" level=info msg="Forcibly stopping sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\"" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.741 [WARNING][4561] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--qpqf4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"632a11c2-55e9-4240-ae20-d43bedff425d", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fa6c71723663975de6e6bf615c88e44a2cd729eec1362d071c60c6624813bf4f", Pod:"coredns-5dd5756b68-qpqf4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef4f682df6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.741 [INFO][4561] k8s.go 578: Cleaning up netns ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.741 [INFO][4561] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" iface="eth0" netns="" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.741 [INFO][4561] k8s.go 585: Releasing IP address(es) ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.741 [INFO][4561] utils.go 188: Calico CNI releasing IP address ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.753 [INFO][4567] ipam_plugin.go 415: Releasing address using handleID ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.753 [INFO][4567] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.753 [INFO][4567] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.758 [WARNING][4567] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.758 [INFO][4567] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" HandleID="k8s-pod-network.4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Workload="localhost-k8s-coredns--5dd5756b68--qpqf4-eth0" Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.759 [INFO][4567] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.761536 env[1153]: 2024-02-12 22:07:20.760 [INFO][4561] k8s.go 591: Teardown processing complete. ContainerID="4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7" Feb 12 22:07:20.763886 env[1153]: time="2024-02-12T22:07:20.763675221Z" level=info msg="TearDown network for sandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" successfully" Feb 12 22:07:20.778696 env[1153]: time="2024-02-12T22:07:20.778668317Z" level=info msg="RemovePodSandbox \"4ef2f68d45a3bdbe369a87625127956462ebe4acca37ed5712bfc226c91594b7\" returns successfully" Feb 12 22:07:20.779068 env[1153]: time="2024-02-12T22:07:20.779037123Z" level=info msg="StopPodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\"" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.799 [WARNING][4586] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0", GenerateName:"calico-kube-controllers-6cdd45c5cd-", Namespace:"calico-system", SelfLink:"", UID:"74ecb67b-9ec9-4e25-b077-620265613885", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd45c5cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343", Pod:"calico-kube-controllers-6cdd45c5cd-74d55", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a5e2249b65", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.799 [INFO][4586] k8s.go 578: Cleaning up netns ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.799 [INFO][4586] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" iface="eth0" netns="" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.799 [INFO][4586] k8s.go 585: Releasing IP address(es) ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.799 [INFO][4586] utils.go 188: Calico CNI releasing IP address ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.823 [INFO][4593] ipam_plugin.go 415: Releasing address using handleID ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.823 [INFO][4593] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.823 [INFO][4593] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.827 [WARNING][4593] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.827 [INFO][4593] ipam_plugin.go 443: Releasing address using workloadID ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.827 [INFO][4593] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.829651 env[1153]: 2024-02-12 22:07:20.828 [INFO][4586] k8s.go 591: Teardown processing complete. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.829992 env[1153]: time="2024-02-12T22:07:20.829670385Z" level=info msg="TearDown network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" successfully" Feb 12 22:07:20.829992 env[1153]: time="2024-02-12T22:07:20.829689757Z" level=info msg="StopPodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" returns successfully" Feb 12 22:07:20.836803 env[1153]: time="2024-02-12T22:07:20.830305954Z" level=info msg="RemovePodSandbox for \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\"" Feb 12 22:07:20.836803 env[1153]: time="2024-02-12T22:07:20.830322449Z" level=info msg="Forcibly stopping sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\"" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.850 [WARNING][4612] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0", GenerateName:"calico-kube-controllers-6cdd45c5cd-", Namespace:"calico-system", SelfLink:"", UID:"74ecb67b-9ec9-4e25-b077-620265613885", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd45c5cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"930718fef66158c6c76abea43b1f0eb5fb10f8c2622327c5312b7dd1d0ac9343", Pod:"calico-kube-controllers-6cdd45c5cd-74d55", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4a5e2249b65", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.850 [INFO][4612] k8s.go 578: Cleaning up netns ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.850 [INFO][4612] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" iface="eth0" netns="" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.850 [INFO][4612] k8s.go 585: Releasing IP address(es) ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.850 [INFO][4612] utils.go 188: Calico CNI releasing IP address ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.864 [INFO][4618] ipam_plugin.go 415: Releasing address using handleID ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.864 [INFO][4618] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.864 [INFO][4618] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.868 [WARNING][4618] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.868 [INFO][4618] ipam_plugin.go 443: Releasing address using workloadID ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" HandleID="k8s-pod-network.20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Workload="localhost-k8s-calico--kube--controllers--6cdd45c5cd--74d55-eth0" Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.869 [INFO][4618] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.871082 env[1153]: 2024-02-12 22:07:20.870 [INFO][4612] k8s.go 591: Teardown processing complete. ContainerID="20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb" Feb 12 22:07:20.879146 env[1153]: time="2024-02-12T22:07:20.871361887Z" level=info msg="TearDown network for sandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" successfully" Feb 12 22:07:20.884079 env[1153]: time="2024-02-12T22:07:20.884062839Z" level=info msg="RemovePodSandbox \"20437eb9d342a3dcace1696cfb9dafbc0e62fb8c0b49eb2e3a576f36da3e96bb\" returns successfully" Feb 12 22:07:20.884423 env[1153]: time="2024-02-12T22:07:20.884403025Z" level=info msg="StopPodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\"" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.905 [WARNING][4638] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ll48v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a7ff1354-1007-4a30-8f38-4daf767f1c55", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665", Pod:"coredns-5dd5756b68-ll48v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9efd79abd6f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.905 [INFO][4638] k8s.go 578: Cleaning up netns ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.905 [INFO][4638] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" iface="eth0" netns="" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.905 [INFO][4638] k8s.go 585: Releasing IP address(es) ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.905 [INFO][4638] utils.go 188: Calico CNI releasing IP address ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.928 [INFO][4644] ipam_plugin.go 415: Releasing address using handleID ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.928 [INFO][4644] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.928 [INFO][4644] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.932 [WARNING][4644] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.932 [INFO][4644] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.933 [INFO][4644] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.935562 env[1153]: 2024-02-12 22:07:20.934 [INFO][4638] k8s.go 591: Teardown processing complete. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.942026 env[1153]: time="2024-02-12T22:07:20.935580817Z" level=info msg="TearDown network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" successfully" Feb 12 22:07:20.942026 env[1153]: time="2024-02-12T22:07:20.935599683Z" level=info msg="StopPodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" returns successfully" Feb 12 22:07:20.942026 env[1153]: time="2024-02-12T22:07:20.936215051Z" level=info msg="RemovePodSandbox for \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\"" Feb 12 22:07:20.942026 env[1153]: time="2024-02-12T22:07:20.936248053Z" level=info msg="Forcibly stopping sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\"" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.959 [WARNING][4663] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ll48v-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a7ff1354-1007-4a30-8f38-4daf767f1c55", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 6, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73d96fc9f0457f9a07536c92f49743037a599e336cd338d6f4f6988d07042665", Pod:"coredns-5dd5756b68-ll48v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9efd79abd6f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.959 [INFO][4663] k8s.go 578: Cleaning up netns ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.959 [INFO][4663] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" iface="eth0" netns="" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.959 [INFO][4663] k8s.go 585: Releasing IP address(es) ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.959 [INFO][4663] utils.go 188: Calico CNI releasing IP address ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.972 [INFO][4669] ipam_plugin.go 415: Releasing address using handleID ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.972 [INFO][4669] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.972 [INFO][4669] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.976 [WARNING][4669] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.976 [INFO][4669] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" HandleID="k8s-pod-network.90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Workload="localhost-k8s-coredns--5dd5756b68--ll48v-eth0" Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.977 [INFO][4669] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:07:20.980038 env[1153]: 2024-02-12 22:07:20.979 [INFO][4663] k8s.go 591: Teardown processing complete. ContainerID="90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e" Feb 12 22:07:20.980447 env[1153]: time="2024-02-12T22:07:20.980427941Z" level=info msg="TearDown network for sandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" successfully" Feb 12 22:07:20.995287 env[1153]: time="2024-02-12T22:07:20.995260025Z" level=info msg="RemovePodSandbox \"90abe27342d548e0c0b1e2ca0f60768aaa8ecb0adc104766fd0cef086b6bd50e\" returns successfully" Feb 12 22:07:21.644317 systemd-networkd[1062]: cali6ed323ab316: Gained IPv6LL Feb 12 22:07:21.900391 systemd-networkd[1062]: calib0dfad3fcf0: Gained IPv6LL Feb 12 22:07:24.697354 env[1153]: time="2024-02-12T22:07:24.697314988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:24.698783 env[1153]: time="2024-02-12T22:07:24.698768021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:24.699622 env[1153]: time="2024-02-12T22:07:24.699610439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:24.700659 env[1153]: time="2024-02-12T22:07:24.700646518Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:24.701105 env[1153]: time="2024-02-12T22:07:24.701087511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:07:24.701752 env[1153]: time="2024-02-12T22:07:24.701739787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:07:24.703899 env[1153]: time="2024-02-12T22:07:24.703881913Z" level=info msg="CreateContainer within sandbox \"727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:07:24.715810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4047590650.mount: Deactivated successfully. Feb 12 22:07:24.718336 env[1153]: time="2024-02-12T22:07:24.718306901Z" level=info msg="CreateContainer within sandbox \"727f716901d7806d0ece0f662c723cf70b9a11008e30cec3a192571807f231e8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478\"" Feb 12 22:07:24.719966 env[1153]: time="2024-02-12T22:07:24.719774982Z" level=info msg="StartContainer for \"de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478\"" Feb 12 22:07:24.735514 systemd[1]: Started cri-containerd-de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478.scope. Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.762020 kernel: kauditd_printk_skb: 246 callbacks suppressed Feb 12 22:07:24.762057 kernel: audit: type=1400 audit(1707775644.759:1435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.766400 kernel: audit: type=1400 audit(1707775644.759:1436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.769616 kernel: audit: type=1400 audit(1707775644.759:1437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.769650 kernel: audit: type=1400 audit(1707775644.759:1438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.774275 kernel: audit: type=1400 audit(1707775644.759:1439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.774304 kernel: audit: type=1400 audit(1707775644.759:1440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.776642 kernel: audit: type=1400 audit(1707775644.759:1441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.784196 kernel: audit: type=1400 audit(1707775644.759:1442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.784234 kernel: audit: type=1400 audit(1707775644.759:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.784253 kernel: audit: type=1400 audit(1707775644.759:1444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.759000 audit: BPF prog-id=209 op=LOAD Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4427 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:24.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313734613532393265353538646238663534646262613334303435 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4427 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:24.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313734613532393265353538646238663534646262613334303435 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit: BPF prog-id=210 op=LOAD Feb 12 22:07:24.765000 audit[4683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261d10 items=0 ppid=4427 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:24.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313734613532393265353538646238663534646262613334303435 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit: BPF prog-id=211 op=LOAD Feb 12 22:07:24.765000 audit[4683]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261d58 items=0 ppid=4427 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:24.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313734613532393265353538646238663534646262613334303435 Feb 12 22:07:24.765000 audit: BPF prog-id=211 op=UNLOAD Feb 12 22:07:24.765000 audit: BPF prog-id=210 op=UNLOAD Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { perfmon } for pid=4683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit[4683]: AVC avc: denied { bpf } for pid=4683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:24.765000 audit: BPF prog-id=212 op=LOAD Feb 12 22:07:24.765000 audit[4683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca168 items=0 ppid=4427 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:24.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465313734613532393265353538646238663534646262613334303435 Feb 12 22:07:24.799579 env[1153]: time="2024-02-12T22:07:24.799554882Z" level=info msg="StartContainer for \"de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478\" returns successfully" Feb 12 22:07:25.070544 env[1153]: time="2024-02-12T22:07:25.070523648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:25.071828 env[1153]: time="2024-02-12T22:07:25.071814834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:25.072733 env[1153]: time="2024-02-12T22:07:25.072713548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:25.073892 env[1153]: time="2024-02-12T22:07:25.073879689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:07:25.074526 env[1153]: time="2024-02-12T22:07:25.074492108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:07:25.075522 env[1153]: time="2024-02-12T22:07:25.075490520Z" level=info msg="CreateContainer within sandbox \"ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:07:25.080938 env[1153]: time="2024-02-12T22:07:25.080920258Z" level=info msg="CreateContainer within sandbox \"ccffc7b8d6481ef4cc1b9b9915d015a03c7638a9fa75db87bac0b66decc73782\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c5e6c4bded180ca929b7ca7ebca36cb420f420f76bc65b7ff5e13bfd3d7f0ec9\"" Feb 12 22:07:25.081401 env[1153]: time="2024-02-12T22:07:25.081305627Z" level=info msg="StartContainer for \"c5e6c4bded180ca929b7ca7ebca36cb420f420f76bc65b7ff5e13bfd3d7f0ec9\"" Feb 12 22:07:25.099374 systemd[1]: Started cri-containerd-c5e6c4bded180ca929b7ca7ebca36cb420f420f76bc65b7ff5e13bfd3d7f0ec9.scope. Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit: BPF prog-id=213 op=LOAD Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4471 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653663346264656431383063613932396237636137656263613336 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4471 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653663346264656431383063613932396237636137656263613336 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.111000 audit: BPF prog-id=214 op=LOAD Feb 12 22:07:25.111000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030d8a0 items=0 ppid=4471 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653663346264656431383063613932396237636137656263613336 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit: BPF prog-id=215 op=LOAD Feb 12 22:07:25.112000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030d8e8 items=0 ppid=4471 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653663346264656431383063613932396237636137656263613336 Feb 12 22:07:25.112000 audit: BPF prog-id=215 op=UNLOAD Feb 12 22:07:25.112000 audit: BPF prog-id=214 op=UNLOAD Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:07:25.112000 audit: BPF prog-id=216 op=LOAD Feb 12 22:07:25.112000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030dcf8 items=0 ppid=4471 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653663346264656431383063613932396237636137656263613336 Feb 12 22:07:25.150107 env[1153]: time="2024-02-12T22:07:25.150071557Z" level=info msg="StartContainer for \"c5e6c4bded180ca929b7ca7ebca36cb420f420f76bc65b7ff5e13bfd3d7f0ec9\" returns successfully" Feb 12 22:07:25.331000 audit[4695]: AVC avc: denied { watch } for pid=4695 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_07_20.1534137849/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c103 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c103 tclass=file permissive=0 Feb 12 22:07:25.331000 audit[4695]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c37fc0 a2=fc6 a3=0 items=0 ppid=4427 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c103 key=(null) Feb 12 22:07:25.331000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:07:25.393347 kubelet[2131]: I0212 22:07:25.393327 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-dc7885668-6869z" podStartSLOduration=1.928042131 podCreationTimestamp="2024-02-12 22:07:19 +0000 UTC" firstStartedPulling="2024-02-12 22:07:20.609396745 +0000 UTC m=+60.682340490" lastFinishedPulling="2024-02-12 22:07:25.074635635 +0000 UTC m=+65.147579380" observedRunningTime="2024-02-12 22:07:25.392717377 +0000 UTC m=+65.465661127" watchObservedRunningTime="2024-02-12 22:07:25.393281021 +0000 UTC m=+65.466224767" Feb 12 22:07:25.394401 kubelet[2131]: I0212 22:07:25.394046 2131 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-dc7885668-fbht9" podStartSLOduration=2.279957299 podCreationTimestamp="2024-02-12 22:07:19 +0000 UTC" firstStartedPulling="2024-02-12 22:07:20.587265336 +0000 UTC m=+60.660209082" lastFinishedPulling="2024-02-12 22:07:24.701337031 +0000 UTC m=+64.774280777" observedRunningTime="2024-02-12 22:07:25.365234301 +0000 UTC m=+65.438178050" watchObservedRunningTime="2024-02-12 22:07:25.394028994 +0000 UTC m=+65.466972743" Feb 12 22:07:25.424000 audit[4753]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:25.424000 audit[4753]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff1900c700 a2=0 a3=7fff1900c6ec items=0 ppid=2291 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:25.426000 audit[4753]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:25.426000 audit[4753]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff1900c700 a2=0 a3=7fff1900c6ec items=0 ppid=2291 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:25.439000 audit[4755]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:25.439000 audit[4755]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffebb84c5b0 a2=0 a3=7ffebb84c59c items=0 ppid=2291 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:25.440000 audit[4755]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:25.440000 audit[4755]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffebb84c5b0 a2=0 a3=7ffebb84c59c items=0 ppid=2291 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:25.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:25.684000 audit[4734]: AVC avc: denied { watch } for pid=4734 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_07_20.367056059/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c515 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c104,c515 tclass=file permissive=0 Feb 12 22:07:25.684000 audit[4734]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c24220 a2=fc6 a3=0 items=0 ppid=4471 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c515 key=(null) Feb 12 22:07:25.684000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:07:25.714539 systemd[1]: run-containerd-runc-k8s.io-de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478-runc.XfipVX.mount: Deactivated successfully. Feb 12 22:07:26.276341 systemd[1]: run-containerd-runc-k8s.io-3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145-runc.jlvQaU.mount: Deactivated successfully. Feb 12 22:07:34.448000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.455204 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 22:07:34.455293 kernel: audit: type=1400 audit(1707775654.448:1477): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.448000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8a60 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.462326 kernel: audit: type=1300 audit(1707775654.448:1477): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8a60 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.462364 kernel: audit: type=1327 audit(1707775654.448:1477): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:34.448000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:34.448000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.468781 kernel: audit: type=1400 audit(1707775654.448:1478): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.468817 kernel: audit: type=1300 audit(1707775654.448:1478): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000df74a0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.448000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000df74a0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.448000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:34.476506 kernel: audit: type=1327 audit(1707775654.448:1478): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:34.476573 kernel: audit: type=1400 audit(1707775654.462:1479): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.462000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.462000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000df74c0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.483934 kernel: audit: type=1300 audit(1707775654.462:1479): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000df74c0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.484002 kernel: audit: type=1327 audit(1707775654.462:1479): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:34.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:34.462000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.490498 kernel: audit: type=1400 audit(1707775654.462:1480): avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:07:34.462000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000ef8a80 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:07:34.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:07:43.401839 systemd[1]: run-containerd-runc-k8s.io-26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298-runc.YUpcEn.mount: Deactivated successfully. Feb 12 22:07:43.671275 systemd[1]: run-containerd-runc-k8s.io-3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145-runc.vmTPoY.mount: Deactivated successfully. Feb 12 22:07:49.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-139.178.89.65:45334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:49.068944 systemd[1]: Started sshd@7-139.178.70.105:22-139.178.89.65:45334.service. Feb 12 22:07:49.071167 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:07:49.071624 kernel: audit: type=1130 audit(1707775669.067:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-139.178.89.65:45334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:49.164000 audit[4846]: USER_ACCT pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.166201 sshd[4846]: Accepted publickey for core from 139.178.89.65 port 45334 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:07:49.171195 kernel: audit: type=1101 audit(1707775669.164:1482): pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.171244 kernel: audit: type=1103 audit(1707775669.168:1483): pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.168000 audit[4846]: CRED_ACQ pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.175268 kernel: audit: type=1006 audit(1707775669.169:1484): pid=4846 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 22:07:49.175564 kernel: audit: type=1300 audit(1707775669.169:1484): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa9a8e440 a2=3 a3=0 items=0 ppid=1 pid=4846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:49.169000 audit[4846]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa9a8e440 a2=3 a3=0 items=0 ppid=1 pid=4846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:49.175379 sshd[4846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:07:49.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:07:49.180009 kernel: audit: type=1327 audit(1707775669.169:1484): proctitle=737368643A20636F7265205B707269765D Feb 12 22:07:49.186433 systemd[1]: Started session-10.scope. Feb 12 22:07:49.187423 systemd-logind[1138]: New session 10 of user core. Feb 12 22:07:49.189000 audit[4846]: USER_START pid=4846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.190000 audit[4848]: CRED_ACQ pid=4848 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.197383 kernel: audit: type=1105 audit(1707775669.189:1485): pid=4846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.197420 kernel: audit: type=1103 audit(1707775669.190:1486): pid=4848 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.564290 sshd[4846]: pam_unix(sshd:session): session closed for user core Feb 12 22:07:49.564000 audit[4846]: USER_END pid=4846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.567000 audit[4846]: CRED_DISP pid=4846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.571859 kernel: audit: type=1106 audit(1707775669.564:1487): pid=4846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.571901 kernel: audit: type=1104 audit(1707775669.567:1488): pid=4846 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:49.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-139.178.89.65:45334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:49.572829 systemd[1]: sshd@7-139.178.70.105:22-139.178.89.65:45334.service: Deactivated successfully. Feb 12 22:07:49.573382 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 22:07:49.573977 systemd-logind[1138]: Session 10 logged out. Waiting for processes to exit. Feb 12 22:07:49.574556 systemd-logind[1138]: Removed session 10. Feb 12 22:07:50.263783 systemd[1]: run-containerd-runc-k8s.io-de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478-runc.cfBEZd.mount: Deactivated successfully. Feb 12 22:07:50.351000 audit[4900]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:50.351000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff816b3a70 a2=0 a3=7fff816b3a5c items=0 ppid=2291 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:50.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:50.354000 audit[4900]: NETFILTER_CFG table=nat:128 family=2 entries=27 op=nft_register_chain pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:50.354000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fff816b3a70 a2=0 a3=7fff816b3a5c items=0 ppid=2291 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:50.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:50.393000 audit[4906]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:50.393000 audit[4906]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffee709c980 a2=0 a3=7ffee709c96c items=0 ppid=2291 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:50.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:50.394000 audit[4906]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:07:50.394000 audit[4906]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffee709c980 a2=0 a3=7ffee709c96c items=0 ppid=2291 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:50.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:07:51.259844 systemd[1]: run-containerd-runc-k8s.io-c5e6c4bded180ca929b7ca7ebca36cb420f420f76bc65b7ff5e13bfd3d7f0ec9-runc.vjiJlw.mount: Deactivated successfully. Feb 12 22:07:54.567179 systemd[1]: Started sshd@8-139.178.70.105:22-139.178.89.65:45344.service. Feb 12 22:07:54.572001 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 22:07:54.572046 kernel: audit: type=1130 audit(1707775674.566:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-139.178.89.65:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:54.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-139.178.89.65:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:54.621000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.626887 sshd[4910]: Accepted publickey for core from 139.178.89.65 port 45344 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:07:54.625000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.627239 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:07:54.631252 kernel: audit: type=1101 audit(1707775674.621:1495): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.631295 kernel: audit: type=1103 audit(1707775674.625:1496): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.635112 kernel: audit: type=1006 audit(1707775674.625:1497): pid=4910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 22:07:54.635377 kernel: audit: type=1300 audit(1707775674.625:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0a22990 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:54.625000 audit[4910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0a22990 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:54.634842 systemd[1]: Started session-11.scope. Feb 12 22:07:54.635450 systemd-logind[1138]: New session 11 of user core. Feb 12 22:07:54.638063 kernel: audit: type=1327 audit(1707775674.625:1497): proctitle=737368643A20636F7265205B707269765D Feb 12 22:07:54.625000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:07:54.639000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.640000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.647551 kernel: audit: type=1105 audit(1707775674.639:1498): pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.647592 kernel: audit: type=1103 audit(1707775674.640:1499): pid=4912 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.766338 sshd[4910]: pam_unix(sshd:session): session closed for user core Feb 12 22:07:54.765000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.768005 systemd-logind[1138]: Session 11 logged out. Waiting for processes to exit. Feb 12 22:07:54.768823 systemd[1]: sshd@8-139.178.70.105:22-139.178.89.65:45344.service: Deactivated successfully. Feb 12 22:07:54.769273 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 22:07:54.770130 systemd-logind[1138]: Removed session 11. Feb 12 22:07:54.765000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.773784 kernel: audit: type=1106 audit(1707775674.765:1500): pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.773834 kernel: audit: type=1104 audit(1707775674.765:1501): pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:54.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-139.178.89.65:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:56.270994 systemd[1]: run-containerd-runc-k8s.io-3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145-runc.nYc42u.mount: Deactivated successfully. Feb 12 22:07:59.770676 systemd[1]: Started sshd@9-139.178.70.105:22-139.178.89.65:43914.service. Feb 12 22:07:59.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-139.178.89.65:43914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:59.772205 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:07:59.772252 kernel: audit: type=1130 audit(1707775679.769:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-139.178.89.65:43914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:07:59.931000 audit[4942]: USER_ACCT pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.935000 audit[4942]: CRED_ACQ pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.939552 kernel: audit: type=1101 audit(1707775679.931:1504): pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.939588 kernel: audit: type=1103 audit(1707775679.935:1505): pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.936631 sshd[4942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:07:59.939773 sshd[4942]: Accepted publickey for core from 139.178.89.65 port 43914 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:07:59.946658 kernel: audit: type=1006 audit(1707775679.935:1506): pid=4942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 22:07:59.946699 kernel: audit: type=1300 audit(1707775679.935:1506): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f2cb250 a2=3 a3=0 items=0 ppid=1 pid=4942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:59.946722 kernel: audit: type=1327 audit(1707775679.935:1506): proctitle=737368643A20636F7265205B707269765D Feb 12 22:07:59.935000 audit[4942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f2cb250 a2=3 a3=0 items=0 ppid=1 pid=4942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:07:59.935000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:07:59.947589 systemd-logind[1138]: New session 12 of user core. Feb 12 22:07:59.948076 systemd[1]: Started session-12.scope. Feb 12 22:07:59.951000 audit[4942]: USER_START pid=4942 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.957194 kernel: audit: type=1105 audit(1707775679.951:1507): pid=4942 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.952000 audit[4944]: CRED_ACQ pid=4944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:07:59.961254 kernel: audit: type=1103 audit(1707775679.952:1508): pid=4944 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.269492 sshd[4942]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:00.270000 audit[4942]: USER_END pid=4942 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.273692 systemd[1]: Started sshd@10-139.178.70.105:22-139.178.89.65:43922.service. Feb 12 22:08:00.276194 kernel: audit: type=1106 audit(1707775680.270:1509): pid=4942 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.275000 audit[4942]: CRED_DISP pid=4942 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.280418 kernel: audit: type=1104 audit(1707775680.275:1510): pid=4942 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-139.178.89.65:43922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:00.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-139.178.89.65:43914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:00.279688 systemd[1]: sshd@9-139.178.70.105:22-139.178.89.65:43914.service: Deactivated successfully. Feb 12 22:08:00.280108 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 22:08:00.282858 systemd-logind[1138]: Session 12 logged out. Waiting for processes to exit. Feb 12 22:08:00.283898 systemd-logind[1138]: Removed session 12. Feb 12 22:08:00.317000 audit[4954]: USER_ACCT pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.319596 sshd[4954]: Accepted publickey for core from 139.178.89.65 port 43922 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:00.318000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.318000 audit[4954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed757ac70 a2=3 a3=0 items=0 ppid=1 pid=4954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:00.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:00.320131 sshd[4954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:00.322982 systemd-logind[1138]: New session 13 of user core. Feb 12 22:08:00.323511 systemd[1]: Started session-13.scope. Feb 12 22:08:00.325000 audit[4954]: USER_START pid=4954 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:00.326000 audit[4957]: CRED_ACQ pid=4957 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.105:22-139.178.89.65:43930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:01.056079 systemd[1]: Started sshd@11-139.178.70.105:22-139.178.89.65:43930.service. Feb 12 22:08:01.079516 sshd[4954]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:01.114000 audit[4954]: USER_END pid=4954 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.117000 audit[4954]: CRED_DISP pid=4954 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-139.178.89.65:43922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:01.131242 systemd[1]: sshd@10-139.178.70.105:22-139.178.89.65:43922.service: Deactivated successfully. Feb 12 22:08:01.131947 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 22:08:01.132630 systemd-logind[1138]: Session 13 logged out. Waiting for processes to exit. Feb 12 22:08:01.133356 systemd-logind[1138]: Removed session 13. Feb 12 22:08:01.180000 audit[4965]: USER_ACCT pid=4965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.181831 sshd[4965]: Accepted publickey for core from 139.178.89.65 port 43930 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:01.181000 audit[4965]: CRED_ACQ pid=4965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.181000 audit[4965]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda527f370 a2=3 a3=0 items=0 ppid=1 pid=4965 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:01.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:01.191298 sshd[4965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:01.196197 systemd-logind[1138]: New session 14 of user core. Feb 12 22:08:01.196744 systemd[1]: Started session-14.scope. Feb 12 22:08:01.198000 audit[4965]: USER_START pid=4965 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.199000 audit[4968]: CRED_ACQ pid=4968 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.333275 sshd[4965]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:01.333000 audit[4965]: USER_END pid=4965 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.333000 audit[4965]: CRED_DISP pid=4965 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:01.335535 systemd-logind[1138]: Session 14 logged out. Waiting for processes to exit. Feb 12 22:08:01.335631 systemd[1]: sshd@11-139.178.70.105:22-139.178.89.65:43930.service: Deactivated successfully. Feb 12 22:08:01.336085 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 22:08:01.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.105:22-139.178.89.65:43930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:01.336630 systemd-logind[1138]: Removed session 14. Feb 12 22:08:06.336250 systemd[1]: Started sshd@12-139.178.70.105:22-139.178.89.65:43940.service. Feb 12 22:08:06.344212 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 22:08:06.344302 kernel: audit: type=1130 audit(1707775686.335:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-139.178.89.65:43940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-139.178.89.65:43940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.375000 audit[4982]: USER_ACCT pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.376991 sshd[4982]: Accepted publickey for core from 139.178.89.65 port 43940 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:06.380188 kernel: audit: type=1101 audit(1707775686.375:1531): pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.379000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.380681 sshd[4982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:06.385494 kernel: audit: type=1103 audit(1707775686.379:1532): pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.385582 kernel: audit: type=1006 audit(1707775686.379:1533): pid=4982 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 22:08:06.379000 audit[4982]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03ea67c0 a2=3 a3=0 items=0 ppid=1 pid=4982 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:06.389127 kernel: audit: type=1300 audit(1707775686.379:1533): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03ea67c0 a2=3 a3=0 items=0 ppid=1 pid=4982 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:06.379000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:06.391205 kernel: audit: type=1327 audit(1707775686.379:1533): proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:06.393163 systemd-logind[1138]: New session 15 of user core. Feb 12 22:08:06.393739 systemd[1]: Started session-15.scope. Feb 12 22:08:06.396000 audit[4982]: USER_START pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.400000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.404818 kernel: audit: type=1105 audit(1707775686.396:1534): pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.404876 kernel: audit: type=1103 audit(1707775686.400:1535): pid=4986 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.505147 sshd[4982]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:06.504000 audit[4982]: USER_END pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.506865 systemd[1]: sshd@12-139.178.70.105:22-139.178.89.65:43940.service: Deactivated successfully. Feb 12 22:08:06.507381 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 22:08:06.510233 kernel: audit: type=1106 audit(1707775686.504:1536): pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.510859 kernel: audit: type=1104 audit(1707775686.504:1537): pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.504000 audit[4982]: CRED_DISP pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:06.513463 systemd-logind[1138]: Session 15 logged out. Waiting for processes to exit. Feb 12 22:08:06.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-139.178.89.65:43940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:06.514073 systemd-logind[1138]: Removed session 15. Feb 12 22:08:11.507482 systemd[1]: Started sshd@13-139.178.70.105:22-139.178.89.65:44630.service. Feb 12 22:08:11.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-139.178.89.65:44630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.511977 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:08:11.512043 kernel: audit: type=1130 audit(1707775691.506:1539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-139.178.89.65:44630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.548000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.549799 sshd[4996]: Accepted publickey for core from 139.178.89.65 port 44630 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:11.553208 kernel: audit: type=1101 audit(1707775691.548:1540): pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.552000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.553666 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:11.558454 kernel: audit: type=1103 audit(1707775691.552:1541): pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.558488 kernel: audit: type=1006 audit(1707775691.552:1542): pid=4996 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 22:08:11.558510 kernel: audit: type=1300 audit(1707775691.552:1542): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe84038400 a2=3 a3=0 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:11.552000 audit[4996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe84038400 a2=3 a3=0 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:11.552000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:11.562971 kernel: audit: type=1327 audit(1707775691.552:1542): proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:11.564032 systemd[1]: Started session-16.scope. Feb 12 22:08:11.565102 systemd-logind[1138]: New session 16 of user core. Feb 12 22:08:11.567000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.585867 kernel: audit: type=1105 audit(1707775691.567:1543): pid=4996 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.585904 kernel: audit: type=1103 audit(1707775691.568:1544): pid=4998 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.568000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.687011 sshd[4996]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:11.686000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.688850 systemd[1]: sshd@13-139.178.70.105:22-139.178.89.65:44630.service: Deactivated successfully. Feb 12 22:08:11.689328 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 22:08:11.686000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.697141 kernel: audit: type=1106 audit(1707775691.686:1545): pid=4996 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.697202 kernel: audit: type=1104 audit(1707775691.686:1546): pid=4996 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:11.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-139.178.89.65:44630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:11.691737 systemd-logind[1138]: Session 16 logged out. Waiting for processes to exit. Feb 12 22:08:11.694980 systemd-logind[1138]: Removed session 16. Feb 12 22:08:13.424181 systemd[1]: run-containerd-runc-k8s.io-26981aa60dead691b882e986e712bed528579f54563a8a0b4cd86ca0cb6df298-runc.ooH5oF.mount: Deactivated successfully. Feb 12 22:08:16.690090 systemd[1]: Started sshd@14-139.178.70.105:22-139.178.89.65:44646.service. Feb 12 22:08:16.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-139.178.89.65:44646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:16.691386 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:08:16.691434 kernel: audit: type=1130 audit(1707775696.689:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-139.178.89.65:44646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:16.750000 audit[5031]: USER_ACCT pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.751402 sshd[5031]: Accepted publickey for core from 139.178.89.65 port 44646 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:16.753000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.757885 kernel: audit: type=1101 audit(1707775696.750:1549): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.757926 kernel: audit: type=1103 audit(1707775696.753:1550): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.757945 kernel: audit: type=1006 audit(1707775696.753:1551): pid=5031 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 22:08:16.758087 sshd[5031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:16.760205 kernel: audit: type=1300 audit(1707775696.753:1551): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a0f96c0 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:16.753000 audit[5031]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a0f96c0 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:16.753000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:16.764720 kernel: audit: type=1327 audit(1707775696.753:1551): proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:16.767059 systemd[1]: Started session-17.scope. Feb 12 22:08:16.767243 systemd-logind[1138]: New session 17 of user core. Feb 12 22:08:16.769000 audit[5031]: USER_START pid=5031 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.773000 audit[5033]: CRED_ACQ pid=5033 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.777378 kernel: audit: type=1105 audit(1707775696.769:1552): pid=5031 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.777415 kernel: audit: type=1103 audit(1707775696.773:1553): pid=5033 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.882322 sshd[5031]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:16.881000 audit[5031]: USER_END pid=5031 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.881000 audit[5031]: CRED_DISP pid=5031 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.889479 kernel: audit: type=1106 audit(1707775696.881:1554): pid=5031 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.889535 kernel: audit: type=1104 audit(1707775696.881:1555): pid=5031 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:16.889715 systemd[1]: sshd@14-139.178.70.105:22-139.178.89.65:44646.service: Deactivated successfully. Feb 12 22:08:16.890186 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 22:08:16.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-139.178.89.65:44646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:16.890852 systemd-logind[1138]: Session 17 logged out. Waiting for processes to exit. Feb 12 22:08:16.891453 systemd-logind[1138]: Removed session 17. Feb 12 22:08:16.987000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:16.987000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fde330 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:08:16.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:08:16.998000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:16.998000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce7680 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:08:16.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:08:17.458000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:17.458000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:17.458000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c013d47bc0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:08:17.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:08:17.458000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c01285e7a0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:08:17.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:08:17.458000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:17.458000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c013d82330 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:08:17.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:08:17.459000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:17.459000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c01285e7c0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:08:17.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:08:17.459000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6303 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:17.459000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c013d823f0 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:08:17.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:08:17.459000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:17.459000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c013d82450 a2=fc6 a3=0 items=0 ppid=1818 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c604 key=(null) Feb 12 22:08:17.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:08:20.267673 systemd[1]: run-containerd-runc-k8s.io-de174a5292e558db8f54dbba3404595096e31eedc10dd10fe3a79f51ecdce478-runc.rGZeLA.mount: Deactivated successfully. Feb 12 22:08:20.293764 systemd[1]: run-containerd-runc-k8s.io-c5e6c4bded180ca929b7ca7ebca36cb420f420f76bc65b7ff5e13bfd3d7f0ec9-runc.Gztr3s.mount: Deactivated successfully. Feb 12 22:08:21.885811 systemd[1]: Started sshd@15-139.178.70.105:22-139.178.89.65:51012.service. Feb 12 22:08:21.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-139.178.89.65:51012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:21.886624 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 22:08:21.889638 kernel: audit: type=1130 audit(1707775701.884:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-139.178.89.65:51012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:21.961211 kernel: audit: type=1101 audit(1707775701.956:1566): pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.956000 audit[5090]: USER_ACCT pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.961000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.966303 sshd[5090]: Accepted publickey for core from 139.178.89.65 port 51012 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:21.967322 kernel: audit: type=1103 audit(1707775701.961:1567): pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.967348 kernel: audit: type=1006 audit(1707775701.961:1568): pid=5090 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 22:08:21.967365 kernel: audit: type=1300 audit(1707775701.961:1568): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda61df2b0 a2=3 a3=0 items=0 ppid=1 pid=5090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:21.961000 audit[5090]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda61df2b0 a2=3 a3=0 items=0 ppid=1 pid=5090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:21.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:21.972067 kernel: audit: type=1327 audit(1707775701.961:1568): proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:21.972242 sshd[5090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:21.975111 systemd-logind[1138]: New session 18 of user core. Feb 12 22:08:21.975624 systemd[1]: Started session-18.scope. Feb 12 22:08:21.978000 audit[5090]: USER_START pid=5090 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.982000 audit[5092]: CRED_ACQ pid=5092 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.986413 kernel: audit: type=1105 audit(1707775701.978:1569): pid=5090 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:21.986497 kernel: audit: type=1103 audit(1707775701.982:1570): pid=5092 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.114597 sshd[5090]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:22.117237 systemd[1]: Started sshd@16-139.178.70.105:22-139.178.89.65:51026.service. Feb 12 22:08:22.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-139.178.89.65:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:22.121198 kernel: audit: type=1130 audit(1707775702.116:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-139.178.89.65:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:22.120000 audit[5090]: USER_END pid=5090 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.121000 audit[5090]: CRED_DISP pid=5090 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.125225 kernel: audit: type=1106 audit(1707775702.120:1572): pid=5090 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.125546 systemd-logind[1138]: Session 18 logged out. Waiting for processes to exit. Feb 12 22:08:22.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-139.178.89.65:51012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:22.126604 systemd[1]: sshd@15-139.178.70.105:22-139.178.89.65:51012.service: Deactivated successfully. Feb 12 22:08:22.127130 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 22:08:22.128276 systemd-logind[1138]: Removed session 18. Feb 12 22:08:22.176000 audit[5101]: USER_ACCT pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.178099 sshd[5101]: Accepted publickey for core from 139.178.89.65 port 51026 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:22.178000 audit[5101]: CRED_ACQ pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.178000 audit[5101]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8db3c8d0 a2=3 a3=0 items=0 ppid=1 pid=5101 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:22.178000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:22.179663 sshd[5101]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:22.182846 systemd[1]: Started session-19.scope. Feb 12 22:08:22.183627 systemd-logind[1138]: New session 19 of user core. Feb 12 22:08:22.186000 audit[5101]: USER_START pid=5101 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.187000 audit[5104]: CRED_ACQ pid=5104 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-139.178.89.65:51032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:22.639648 systemd[1]: Started sshd@17-139.178.70.105:22-139.178.89.65:51032.service. Feb 12 22:08:22.643210 sshd[5101]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:22.642000 audit[5101]: USER_END pid=5101 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.642000 audit[5101]: CRED_DISP pid=5101 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.644952 systemd[1]: sshd@16-139.178.70.105:22-139.178.89.65:51026.service: Deactivated successfully. Feb 12 22:08:22.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-139.178.89.65:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:22.646444 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 22:08:22.647337 systemd-logind[1138]: Session 19 logged out. Waiting for processes to exit. Feb 12 22:08:22.648104 systemd-logind[1138]: Removed session 19. Feb 12 22:08:22.688000 audit[5110]: USER_ACCT pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.689946 sshd[5110]: Accepted publickey for core from 139.178.89.65 port 51032 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:22.689000 audit[5110]: CRED_ACQ pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.689000 audit[5110]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb424a5a0 a2=3 a3=0 items=0 ppid=1 pid=5110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:22.689000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:22.691214 sshd[5110]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:22.693780 systemd-logind[1138]: New session 20 of user core. Feb 12 22:08:22.694353 systemd[1]: Started session-20.scope. Feb 12 22:08:22.696000 audit[5110]: USER_START pid=5110 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:22.697000 audit[5113]: CRED_ACQ pid=5113 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:23.667093 sshd[5110]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:23.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-139.178.89.65:51034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.668000 audit[5110]: USER_END pid=5110 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:23.669743 systemd[1]: Started sshd@18-139.178.70.105:22-139.178.89.65:51034.service. Feb 12 22:08:23.672000 audit[5110]: CRED_DISP pid=5110 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:23.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-139.178.89.65:51032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:23.684490 systemd[1]: sshd@17-139.178.70.105:22-139.178.89.65:51032.service: Deactivated successfully. Feb 12 22:08:23.685061 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 22:08:23.685972 systemd-logind[1138]: Session 20 logged out. Waiting for processes to exit. Feb 12 22:08:23.686551 systemd-logind[1138]: Removed session 20. Feb 12 22:08:23.699000 audit[5126]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:23.699000 audit[5126]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd5a1a1160 a2=0 a3=7ffd5a1a114c items=0 ppid=2291 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:23.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:23.700000 audit[5126]: NETFILTER_CFG table=nat:132 family=2 entries=22 op=nft_register_rule pid=5126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:23.700000 audit[5126]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffd5a1a1160 a2=0 a3=31030 items=0 ppid=2291 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:23.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:23.731000 audit[5129]: NETFILTER_CFG table=filter:133 family=2 entries=32 op=nft_register_rule pid=5129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:23.731000 audit[5129]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe7c5aea30 a2=0 a3=7ffe7c5aea1c items=0 ppid=2291 pid=5129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:23.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:23.732000 audit[5129]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:23.732000 audit[5129]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffe7c5aea30 a2=0 a3=31030 items=0 ppid=2291 pid=5129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:23.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:23.753218 sshd[5124]: Accepted publickey for core from 139.178.89.65 port 51034 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:23.751000 audit[5124]: USER_ACCT pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:23.752000 audit[5124]: CRED_ACQ pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:23.752000 audit[5124]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe75680410 a2=3 a3=0 items=0 ppid=1 pid=5124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:23.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:23.755225 sshd[5124]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:23.758532 systemd-logind[1138]: New session 21 of user core. Feb 12 22:08:23.759067 systemd[1]: Started session-21.scope. Feb 12 22:08:23.761000 audit[5124]: USER_START pid=5124 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:23.762000 audit[5130]: CRED_ACQ pid=5130 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:24.973707 systemd[1]: Started sshd@19-139.178.70.105:22-139.178.89.65:51044.service. Feb 12 22:08:24.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-139.178.89.65:51044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:25.069066 sshd[5124]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:25.145000 audit[5124]: USER_END pid=5124 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.177000 audit[5124]: CRED_DISP pid=5124 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-139.178.89.65:51034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:25.223230 systemd[1]: sshd@18-139.178.70.105:22-139.178.89.65:51034.service: Deactivated successfully. Feb 12 22:08:25.223811 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 22:08:25.224934 systemd-logind[1138]: Session 21 logged out. Waiting for processes to exit. Feb 12 22:08:25.226243 systemd-logind[1138]: Removed session 21. Feb 12 22:08:25.239026 sshd[5155]: Accepted publickey for core from 139.178.89.65 port 51044 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:25.237000 audit[5155]: USER_ACCT pid=5155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.238000 audit[5155]: CRED_ACQ pid=5155 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.238000 audit[5155]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc0a428f0 a2=3 a3=0 items=0 ppid=1 pid=5155 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:25.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:25.240386 sshd[5155]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:25.243985 systemd[1]: Started session-22.scope. Feb 12 22:08:25.244889 systemd-logind[1138]: New session 22 of user core. Feb 12 22:08:25.246000 audit[5155]: USER_START pid=5155 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.247000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.341000 audit[4695]: AVC avc: denied { watch } for pid=4695 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_07_20.1534137849/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c103 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c2,c103 tclass=file permissive=0 Feb 12 22:08:25.341000 audit[4695]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001dba380 a2=fc6 a3=0 items=0 ppid=4427 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c103 key=(null) Feb 12 22:08:25.341000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:08:25.381617 sshd[5155]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:25.381000 audit[5155]: USER_END pid=5155 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.381000 audit[5155]: CRED_DISP pid=5155 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:25.383634 systemd-logind[1138]: Session 22 logged out. Waiting for processes to exit. Feb 12 22:08:25.383715 systemd[1]: sshd@19-139.178.70.105:22-139.178.89.65:51044.service: Deactivated successfully. Feb 12 22:08:25.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-139.178.89.65:51044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:25.384154 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 22:08:25.384649 systemd-logind[1138]: Removed session 22. Feb 12 22:08:25.685000 audit[4734]: AVC avc: denied { watch } for pid=4734 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_07_20.367056059/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c515 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c104,c515 tclass=file permissive=0 Feb 12 22:08:25.685000 audit[4734]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001207400 a2=fc6 a3=0 items=0 ppid=4471 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c515 key=(null) Feb 12 22:08:25.685000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:08:26.330779 systemd[1]: run-containerd-runc-k8s.io-3829d4256c84c21507008cfbbbb6f56e12ea8cc25011dca099f308f0f3f93145-runc.YjsFGq.mount: Deactivated successfully. Feb 12 22:08:29.871000 audit[5186]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:29.877157 kernel: kauditd_printk_skb: 63 callbacks suppressed Feb 12 22:08:29.885045 kernel: audit: type=1325 audit(1707775709.871:1616): table=filter:135 family=2 entries=20 op=nft_register_rule pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:29.885102 kernel: audit: type=1300 audit(1707775709.871:1616): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffe1ce9a50 a2=0 a3=7fffe1ce9a3c items=0 ppid=2291 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:29.893016 kernel: audit: type=1327 audit(1707775709.871:1616): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:29.893053 kernel: audit: type=1325 audit(1707775709.880:1617): table=nat:136 family=2 entries=106 op=nft_register_chain pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:29.893073 kernel: audit: type=1300 audit(1707775709.880:1617): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fffe1ce9a50 a2=0 a3=7fffe1ce9a3c items=0 ppid=2291 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:29.893090 kernel: audit: type=1327 audit(1707775709.880:1617): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:29.871000 audit[5186]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffe1ce9a50 a2=0 a3=7fffe1ce9a3c items=0 ppid=2291 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:29.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:29.880000 audit[5186]: NETFILTER_CFG table=nat:136 family=2 entries=106 op=nft_register_chain pid=5186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:08:29.880000 audit[5186]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fffe1ce9a50 a2=0 a3=7fffe1ce9a3c items=0 ppid=2291 pid=5186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:29.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:08:30.385834 systemd[1]: Started sshd@20-139.178.70.105:22-139.178.89.65:49530.service. Feb 12 22:08:30.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-139.178.89.65:49530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.391218 kernel: audit: type=1130 audit(1707775710.384:1618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-139.178.89.65:49530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.734000 audit[5195]: USER_ACCT pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.736430 sshd[5195]: Accepted publickey for core from 139.178.89.65 port 49530 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:30.738000 audit[5195]: CRED_ACQ pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.741881 kernel: audit: type=1101 audit(1707775710.734:1619): pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.741954 kernel: audit: type=1103 audit(1707775710.738:1620): pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.743902 kernel: audit: type=1006 audit(1707775710.738:1621): pid=5195 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 22:08:30.738000 audit[5195]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2ee57c30 a2=3 a3=0 items=0 ppid=1 pid=5195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:30.738000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:30.744035 sshd[5195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:30.747009 systemd-logind[1138]: New session 23 of user core. Feb 12 22:08:30.747548 systemd[1]: Started session-23.scope. Feb 12 22:08:30.749000 audit[5195]: USER_START pid=5195 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.750000 audit[5197]: CRED_ACQ pid=5197 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.919472 sshd[5195]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:30.919000 audit[5195]: USER_END pid=5195 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.919000 audit[5195]: CRED_DISP pid=5195 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:30.921327 systemd-logind[1138]: Session 23 logged out. Waiting for processes to exit. Feb 12 22:08:30.921412 systemd[1]: sshd@20-139.178.70.105:22-139.178.89.65:49530.service: Deactivated successfully. Feb 12 22:08:30.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-139.178.89.65:49530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:30.921869 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 22:08:30.922491 systemd-logind[1138]: Removed session 23. Feb 12 22:08:34.526000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:34.526000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d610c0 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:08:34.526000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:08:34.530000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:34.530000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a39220 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:08:34.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:08:34.530000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:34.530000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a39240 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:08:34.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:08:34.530000 audit[1999]: AVC avc: denied { watch } for pid=1999 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:08:34.530000 audit[1999]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a39260 a2=fc6 a3=0 items=0 ppid=1831 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c104,c569 key=(null) Feb 12 22:08:34.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:08:35.922905 systemd[1]: Started sshd@21-139.178.70.105:22-139.178.89.65:49532.service. Feb 12 22:08:35.927623 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 12 22:08:35.927664 kernel: audit: type=1130 audit(1707775715.921:1631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-139.178.89.65:49532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:35.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-139.178.89.65:49532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:35.960000 audit[5207]: USER_ACCT pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.966023 sshd[5207]: Accepted publickey for core from 139.178.89.65 port 49532 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:35.966231 kernel: audit: type=1101 audit(1707775715.960:1632): pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.965000 audit[5207]: CRED_ACQ pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.967207 sshd[5207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:35.972549 kernel: audit: type=1103 audit(1707775715.965:1633): pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.972611 kernel: audit: type=1006 audit(1707775715.965:1634): pid=5207 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 22:08:35.965000 audit[5207]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5529dec0 a2=3 a3=0 items=0 ppid=1 pid=5207 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:35.976708 kernel: audit: type=1300 audit(1707775715.965:1634): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5529dec0 a2=3 a3=0 items=0 ppid=1 pid=5207 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:35.965000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:35.978056 kernel: audit: type=1327 audit(1707775715.965:1634): proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:35.980421 systemd[1]: Started session-24.scope. Feb 12 22:08:35.983000 audit[5207]: USER_START pid=5207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.980756 systemd-logind[1138]: New session 24 of user core. Feb 12 22:08:35.983000 audit[5209]: CRED_ACQ pid=5209 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.992542 kernel: audit: type=1105 audit(1707775715.983:1635): pid=5207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:35.992639 kernel: audit: type=1103 audit(1707775715.983:1636): pid=5209 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:36.075239 sshd[5207]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:36.074000 audit[5207]: USER_END pid=5207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:36.077087 systemd[1]: sshd@21-139.178.70.105:22-139.178.89.65:49532.service: Deactivated successfully. Feb 12 22:08:36.077553 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 22:08:36.081134 systemd-logind[1138]: Session 24 logged out. Waiting for processes to exit. Feb 12 22:08:36.081208 kernel: audit: type=1106 audit(1707775716.074:1637): pid=5207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:36.081804 systemd-logind[1138]: Removed session 24. Feb 12 22:08:36.074000 audit[5207]: CRED_DISP pid=5207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:36.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-139.178.89.65:49532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:36.086478 kernel: audit: type=1104 audit(1707775716.074:1638): pid=5207 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.078161 systemd[1]: Started sshd@22-139.178.70.105:22-139.178.89.65:56252.service. Feb 12 22:08:41.080125 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:08:41.083097 kernel: audit: type=1130 audit(1707775721.078:1640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-139.178.89.65:56252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:41.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-139.178.89.65:56252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:41.128000 audit[5222]: USER_ACCT pid=5222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.135895 kernel: audit: type=1101 audit(1707775721.128:1641): pid=5222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.135930 kernel: audit: type=1103 audit(1707775721.132:1642): pid=5222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.132000 audit[5222]: CRED_ACQ pid=5222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.135991 sshd[5222]: Accepted publickey for core from 139.178.89.65 port 56252 ssh2: RSA SHA256:HiqmCZ5wMmSvO0wWrhK3vjnBlpa7aAHv9/SVtM7jhV0 Feb 12 22:08:41.138218 kernel: audit: type=1006 audit(1707775721.132:1643): pid=5222 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 22:08:41.132762 sshd[5222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:08:41.132000 audit[5222]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaca02150 a2=3 a3=0 items=0 ppid=1 pid=5222 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:41.143136 kernel: audit: type=1300 audit(1707775721.132:1643): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaca02150 a2=3 a3=0 items=0 ppid=1 pid=5222 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:08:41.143187 kernel: audit: type=1327 audit(1707775721.132:1643): proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:41.132000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:08:41.143685 systemd[1]: Started session-25.scope. Feb 12 22:08:41.143901 systemd-logind[1138]: New session 25 of user core. Feb 12 22:08:41.146000 audit[5222]: USER_START pid=5222 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.153772 kernel: audit: type=1105 audit(1707775721.146:1644): pid=5222 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.153801 kernel: audit: type=1103 audit(1707775721.147:1645): pid=5224 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.147000 audit[5224]: CRED_ACQ pid=5224 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.248900 sshd[5222]: pam_unix(sshd:session): session closed for user core Feb 12 22:08:41.250000 audit[5222]: USER_END pid=5222 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.251261 systemd[1]: sshd@22-139.178.70.105:22-139.178.89.65:56252.service: Deactivated successfully. Feb 12 22:08:41.251758 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 22:08:41.254231 kernel: audit: type=1106 audit(1707775721.250:1646): pid=5222 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.254416 kernel: audit: type=1104 audit(1707775721.250:1647): pid=5222 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.250000 audit[5222]: CRED_DISP pid=5222 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:08:41.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-139.178.89.65:56252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:08:41.257138 systemd-logind[1138]: Session 25 logged out. Waiting for processes to exit. Feb 12 22:08:41.257847 systemd-logind[1138]: Removed session 25.