Feb 12 22:12:43.641922 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:12:43.641936 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:12:43.641942 kernel: Disabled fast string operations Feb 12 22:12:43.641945 kernel: BIOS-provided physical RAM map: Feb 12 22:12:43.641949 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Feb 12 22:12:43.641953 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Feb 12 22:12:43.641958 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Feb 12 22:12:43.641962 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Feb 12 22:12:43.641966 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Feb 12 22:12:43.641969 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Feb 12 22:12:43.641973 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Feb 12 22:12:43.641977 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Feb 12 22:12:43.641980 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Feb 12 22:12:43.641984 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 12 22:12:43.641990 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Feb 12 22:12:43.641994 kernel: NX (Execute Disable) protection: active Feb 12 22:12:43.641998 kernel: SMBIOS 2.7 present. Feb 12 22:12:43.642003 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Feb 12 22:12:43.642007 kernel: vmware: hypercall mode: 0x00 Feb 12 22:12:43.642011 kernel: Hypervisor detected: VMware Feb 12 22:12:43.642016 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Feb 12 22:12:43.642020 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Feb 12 22:12:43.642024 kernel: vmware: using clock offset of 2594329244 ns Feb 12 22:12:43.642028 kernel: tsc: Detected 3408.000 MHz processor Feb 12 22:12:43.642032 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:12:43.642037 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:12:43.645859 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Feb 12 22:12:43.645871 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:12:43.645876 kernel: total RAM covered: 3072M Feb 12 22:12:43.645883 kernel: Found optimal setting for mtrr clean up Feb 12 22:12:43.645888 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Feb 12 22:12:43.645892 kernel: Using GB pages for direct mapping Feb 12 22:12:43.645896 kernel: ACPI: Early table checksum verification disabled Feb 12 22:12:43.645900 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Feb 12 22:12:43.645905 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Feb 12 22:12:43.645909 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Feb 12 22:12:43.645913 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Feb 12 22:12:43.645917 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 12 22:12:43.645921 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Feb 12 22:12:43.645926 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Feb 12 22:12:43.645933 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Feb 12 22:12:43.645937 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Feb 12 22:12:43.645942 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Feb 12 22:12:43.645946 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Feb 12 22:12:43.645952 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Feb 12 22:12:43.645956 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Feb 12 22:12:43.645961 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Feb 12 22:12:43.645966 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 12 22:12:43.645970 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Feb 12 22:12:43.645975 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Feb 12 22:12:43.645979 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Feb 12 22:12:43.645984 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Feb 12 22:12:43.645988 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Feb 12 22:12:43.645993 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Feb 12 22:12:43.645998 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Feb 12 22:12:43.646002 kernel: system APIC only can use physical flat Feb 12 22:12:43.646007 kernel: Setting APIC routing to physical flat. Feb 12 22:12:43.646011 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 22:12:43.646016 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Feb 12 22:12:43.646020 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Feb 12 22:12:43.646025 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Feb 12 22:12:43.646030 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Feb 12 22:12:43.646035 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Feb 12 22:12:43.646039 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Feb 12 22:12:43.646044 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Feb 12 22:12:43.646048 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Feb 12 22:12:43.646053 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Feb 12 22:12:43.646057 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Feb 12 22:12:43.646061 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Feb 12 22:12:43.646066 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Feb 12 22:12:43.646070 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Feb 12 22:12:43.646075 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Feb 12 22:12:43.646080 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Feb 12 22:12:43.646085 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Feb 12 22:12:43.646089 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Feb 12 22:12:43.646093 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Feb 12 22:12:43.646098 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Feb 12 22:12:43.646102 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Feb 12 22:12:43.646107 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Feb 12 22:12:43.646111 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Feb 12 22:12:43.646116 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Feb 12 22:12:43.646120 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Feb 12 22:12:43.646125 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Feb 12 22:12:43.646130 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Feb 12 22:12:43.646134 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Feb 12 22:12:43.646139 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Feb 12 22:12:43.646143 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Feb 12 22:12:43.646147 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Feb 12 22:12:43.646152 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Feb 12 22:12:43.646156 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Feb 12 22:12:43.646161 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Feb 12 22:12:43.646165 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Feb 12 22:12:43.646171 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Feb 12 22:12:43.646175 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Feb 12 22:12:43.646180 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Feb 12 22:12:43.646184 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Feb 12 22:12:43.646188 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Feb 12 22:12:43.646193 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Feb 12 22:12:43.646197 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Feb 12 22:12:43.646202 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Feb 12 22:12:43.646206 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Feb 12 22:12:43.646211 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Feb 12 22:12:43.646216 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Feb 12 22:12:43.646220 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Feb 12 22:12:43.646225 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Feb 12 22:12:43.646229 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Feb 12 22:12:43.646234 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Feb 12 22:12:43.646238 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Feb 12 22:12:43.646243 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Feb 12 22:12:43.646247 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Feb 12 22:12:43.646251 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Feb 12 22:12:43.646256 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Feb 12 22:12:43.646261 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Feb 12 22:12:43.646266 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Feb 12 22:12:43.646270 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Feb 12 22:12:43.646275 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Feb 12 22:12:43.646279 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Feb 12 22:12:43.646284 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Feb 12 22:12:43.646292 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Feb 12 22:12:43.646297 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Feb 12 22:12:43.646302 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Feb 12 22:12:43.646307 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Feb 12 22:12:43.646313 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Feb 12 22:12:43.646318 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Feb 12 22:12:43.646322 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Feb 12 22:12:43.646327 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Feb 12 22:12:43.646332 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Feb 12 22:12:43.646337 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Feb 12 22:12:43.646341 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Feb 12 22:12:43.646346 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Feb 12 22:12:43.646352 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Feb 12 22:12:43.646357 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Feb 12 22:12:43.646362 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Feb 12 22:12:43.646366 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Feb 12 22:12:43.646371 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Feb 12 22:12:43.646376 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Feb 12 22:12:43.646381 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Feb 12 22:12:43.646385 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Feb 12 22:12:43.646390 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Feb 12 22:12:43.646395 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Feb 12 22:12:43.646400 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Feb 12 22:12:43.646405 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Feb 12 22:12:43.646410 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Feb 12 22:12:43.646415 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Feb 12 22:12:43.646420 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Feb 12 22:12:43.646424 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Feb 12 22:12:43.646429 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Feb 12 22:12:43.646434 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Feb 12 22:12:43.646439 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Feb 12 22:12:43.646444 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Feb 12 22:12:43.646449 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Feb 12 22:12:43.646454 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Feb 12 22:12:43.646459 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Feb 12 22:12:43.646464 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Feb 12 22:12:43.646468 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Feb 12 22:12:43.646473 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Feb 12 22:12:43.646478 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Feb 12 22:12:43.646483 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Feb 12 22:12:43.646488 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Feb 12 22:12:43.646493 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Feb 12 22:12:43.646498 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Feb 12 22:12:43.646503 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Feb 12 22:12:43.646508 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Feb 12 22:12:43.646512 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Feb 12 22:12:43.646517 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Feb 12 22:12:43.646522 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Feb 12 22:12:43.646527 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Feb 12 22:12:43.646532 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Feb 12 22:12:43.646537 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Feb 12 22:12:43.646543 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Feb 12 22:12:43.646548 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Feb 12 22:12:43.646552 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Feb 12 22:12:43.646557 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Feb 12 22:12:43.646562 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Feb 12 22:12:43.646567 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Feb 12 22:12:43.646571 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Feb 12 22:12:43.646576 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Feb 12 22:12:43.646581 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Feb 12 22:12:43.646586 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Feb 12 22:12:43.646591 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Feb 12 22:12:43.646596 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Feb 12 22:12:43.646601 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Feb 12 22:12:43.646606 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Feb 12 22:12:43.646610 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Feb 12 22:12:43.646615 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Feb 12 22:12:43.646620 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 22:12:43.646625 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 22:12:43.646629 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Feb 12 22:12:43.646636 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Feb 12 22:12:43.646640 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Feb 12 22:12:43.646646 kernel: Zone ranges: Feb 12 22:12:43.646650 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:12:43.646655 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Feb 12 22:12:43.646660 kernel: Normal empty Feb 12 22:12:43.646665 kernel: Movable zone start for each node Feb 12 22:12:43.646670 kernel: Early memory node ranges Feb 12 22:12:43.646675 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Feb 12 22:12:43.646679 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Feb 12 22:12:43.646685 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Feb 12 22:12:43.646690 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Feb 12 22:12:43.646695 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:12:43.646700 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Feb 12 22:12:43.646705 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Feb 12 22:12:43.646710 kernel: ACPI: PM-Timer IO Port: 0x1008 Feb 12 22:12:43.646715 kernel: system APIC only can use physical flat Feb 12 22:12:43.646720 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Feb 12 22:12:43.646724 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 12 22:12:43.646730 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 12 22:12:43.646735 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 12 22:12:43.646740 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 12 22:12:43.646745 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 12 22:12:43.646750 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 12 22:12:43.646755 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 12 22:12:43.646760 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 12 22:12:43.646765 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 12 22:12:43.646769 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 12 22:12:43.646774 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 12 22:12:43.646780 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 12 22:12:43.646785 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 12 22:12:43.646790 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 12 22:12:43.646802 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 12 22:12:43.646809 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 12 22:12:43.646815 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Feb 12 22:12:43.646819 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Feb 12 22:12:43.646824 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Feb 12 22:12:43.646829 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Feb 12 22:12:43.646835 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Feb 12 22:12:43.646840 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Feb 12 22:12:43.646845 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Feb 12 22:12:43.646850 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Feb 12 22:12:43.646854 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Feb 12 22:12:43.646859 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Feb 12 22:12:43.646864 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Feb 12 22:12:43.646869 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Feb 12 22:12:43.646874 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Feb 12 22:12:43.646878 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Feb 12 22:12:43.646884 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Feb 12 22:12:43.646889 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Feb 12 22:12:43.646894 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Feb 12 22:12:43.646899 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Feb 12 22:12:43.646904 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Feb 12 22:12:43.646908 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Feb 12 22:12:43.646913 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Feb 12 22:12:43.646918 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Feb 12 22:12:43.646923 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Feb 12 22:12:43.646928 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Feb 12 22:12:43.646933 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Feb 12 22:12:43.646938 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Feb 12 22:12:43.646943 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Feb 12 22:12:43.646948 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Feb 12 22:12:43.646953 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Feb 12 22:12:43.646957 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Feb 12 22:12:43.646962 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Feb 12 22:12:43.646967 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Feb 12 22:12:43.646973 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Feb 12 22:12:43.646978 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Feb 12 22:12:43.646982 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Feb 12 22:12:43.646987 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Feb 12 22:12:43.646992 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Feb 12 22:12:43.646997 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Feb 12 22:12:43.647002 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Feb 12 22:12:43.647006 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Feb 12 22:12:43.647011 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Feb 12 22:12:43.647016 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Feb 12 22:12:43.647022 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Feb 12 22:12:43.647027 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Feb 12 22:12:43.647031 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Feb 12 22:12:43.647036 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Feb 12 22:12:43.647041 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Feb 12 22:12:43.647046 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Feb 12 22:12:43.647051 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Feb 12 22:12:43.647055 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Feb 12 22:12:43.647060 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Feb 12 22:12:43.647066 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Feb 12 22:12:43.647071 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Feb 12 22:12:43.647075 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Feb 12 22:12:43.647080 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Feb 12 22:12:43.647085 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Feb 12 22:12:43.647090 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Feb 12 22:12:43.647095 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Feb 12 22:12:43.647100 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Feb 12 22:12:43.647104 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Feb 12 22:12:43.647109 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Feb 12 22:12:43.647115 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Feb 12 22:12:43.647134 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Feb 12 22:12:43.647140 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Feb 12 22:12:43.647145 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Feb 12 22:12:43.647150 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Feb 12 22:12:43.647155 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Feb 12 22:12:43.647159 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Feb 12 22:12:43.647164 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Feb 12 22:12:43.647169 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Feb 12 22:12:43.647175 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Feb 12 22:12:43.647180 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Feb 12 22:12:43.647184 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Feb 12 22:12:43.647189 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Feb 12 22:12:43.647194 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Feb 12 22:12:43.647199 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Feb 12 22:12:43.647203 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Feb 12 22:12:43.647208 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Feb 12 22:12:43.647219 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Feb 12 22:12:43.647224 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Feb 12 22:12:43.647230 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Feb 12 22:12:43.647235 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Feb 12 22:12:43.647240 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Feb 12 22:12:43.647245 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Feb 12 22:12:43.647249 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Feb 12 22:12:43.647254 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Feb 12 22:12:43.647259 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Feb 12 22:12:43.647264 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Feb 12 22:12:43.647268 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Feb 12 22:12:43.647274 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Feb 12 22:12:43.647279 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Feb 12 22:12:43.647284 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Feb 12 22:12:43.647289 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Feb 12 22:12:43.647293 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Feb 12 22:12:43.647298 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Feb 12 22:12:43.647303 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Feb 12 22:12:43.647308 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Feb 12 22:12:43.647313 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Feb 12 22:12:43.647317 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Feb 12 22:12:43.647323 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Feb 12 22:12:43.647328 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Feb 12 22:12:43.647333 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Feb 12 22:12:43.647337 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Feb 12 22:12:43.647342 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Feb 12 22:12:43.647347 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Feb 12 22:12:43.647352 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Feb 12 22:12:43.647357 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Feb 12 22:12:43.647362 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Feb 12 22:12:43.647367 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Feb 12 22:12:43.647372 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Feb 12 22:12:43.647377 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Feb 12 22:12:43.647382 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Feb 12 22:12:43.647387 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Feb 12 22:12:43.647392 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:12:43.647397 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Feb 12 22:12:43.647401 kernel: TSC deadline timer available Feb 12 22:12:43.647406 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Feb 12 22:12:43.647412 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Feb 12 22:12:43.647417 kernel: Booting paravirtualized kernel on VMware hypervisor Feb 12 22:12:43.647422 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:12:43.647427 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Feb 12 22:12:43.647432 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 12 22:12:43.647437 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 12 22:12:43.647441 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Feb 12 22:12:43.647446 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Feb 12 22:12:43.647451 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Feb 12 22:12:43.647456 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Feb 12 22:12:43.647461 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Feb 12 22:12:43.647466 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Feb 12 22:12:43.647471 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Feb 12 22:12:43.647482 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Feb 12 22:12:43.647488 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Feb 12 22:12:43.647493 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Feb 12 22:12:43.647498 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Feb 12 22:12:43.647503 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Feb 12 22:12:43.647509 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Feb 12 22:12:43.647514 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Feb 12 22:12:43.647519 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Feb 12 22:12:43.647526 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Feb 12 22:12:43.647531 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Feb 12 22:12:43.647536 kernel: Policy zone: DMA32 Feb 12 22:12:43.647542 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:12:43.647548 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:12:43.647554 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Feb 12 22:12:43.647559 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Feb 12 22:12:43.647564 kernel: printk: log_buf_len min size: 262144 bytes Feb 12 22:12:43.647569 kernel: printk: log_buf_len: 1048576 bytes Feb 12 22:12:43.647575 kernel: printk: early log buf free: 239728(91%) Feb 12 22:12:43.647580 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:12:43.647585 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 22:12:43.647590 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:12:43.647596 kernel: Memory: 1942952K/2096628K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 153416K reserved, 0K cma-reserved) Feb 12 22:12:43.647602 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Feb 12 22:12:43.647607 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:12:43.647613 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:12:43.647619 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:12:43.647624 kernel: rcu: RCU event tracing is enabled. Feb 12 22:12:43.647629 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Feb 12 22:12:43.647636 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:12:43.647641 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:12:43.647646 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:12:43.647651 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Feb 12 22:12:43.647656 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Feb 12 22:12:43.647662 kernel: random: crng init done Feb 12 22:12:43.647667 kernel: Console: colour VGA+ 80x25 Feb 12 22:12:43.647672 kernel: printk: console [tty0] enabled Feb 12 22:12:43.647677 kernel: printk: console [ttyS0] enabled Feb 12 22:12:43.647683 kernel: ACPI: Core revision 20210730 Feb 12 22:12:43.647688 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Feb 12 22:12:43.647694 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:12:43.647699 kernel: x2apic enabled Feb 12 22:12:43.647704 kernel: Switched APIC routing to physical x2apic. Feb 12 22:12:43.647726 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 22:12:43.647731 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 12 22:12:43.647737 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Feb 12 22:12:43.647742 kernel: Disabled fast string operations Feb 12 22:12:43.647762 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:12:43.647768 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:12:43.647773 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:12:43.647778 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 12 22:12:43.647784 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 12 22:12:43.647789 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:12:43.648808 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 12 22:12:43.648821 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 12 22:12:43.648827 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 22:12:43.648835 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 22:12:43.648840 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:12:43.648846 kernel: SRBDS: Unknown: Dependent on hypervisor status Feb 12 22:12:43.648851 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 22:12:43.648856 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:12:43.648862 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:12:43.648867 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:12:43.648872 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:12:43.648879 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 12 22:12:43.648884 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:12:43.648890 kernel: pid_max: default: 131072 minimum: 1024 Feb 12 22:12:43.648895 kernel: LSM: Security Framework initializing Feb 12 22:12:43.648900 kernel: SELinux: Initializing. Feb 12 22:12:43.648906 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:12:43.648911 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:12:43.648917 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 12 22:12:43.648922 kernel: Performance Events: Skylake events, core PMU driver. Feb 12 22:12:43.648928 kernel: core: CPUID marked event: 'cpu cycles' unavailable Feb 12 22:12:43.648933 kernel: core: CPUID marked event: 'instructions' unavailable Feb 12 22:12:43.648938 kernel: core: CPUID marked event: 'bus cycles' unavailable Feb 12 22:12:43.648945 kernel: core: CPUID marked event: 'cache references' unavailable Feb 12 22:12:43.648950 kernel: core: CPUID marked event: 'cache misses' unavailable Feb 12 22:12:43.648955 kernel: core: CPUID marked event: 'branch instructions' unavailable Feb 12 22:12:43.648960 kernel: core: CPUID marked event: 'branch misses' unavailable Feb 12 22:12:43.648965 kernel: ... version: 1 Feb 12 22:12:43.648971 kernel: ... bit width: 48 Feb 12 22:12:43.648977 kernel: ... generic registers: 4 Feb 12 22:12:43.648982 kernel: ... value mask: 0000ffffffffffff Feb 12 22:12:43.648988 kernel: ... max period: 000000007fffffff Feb 12 22:12:43.648993 kernel: ... fixed-purpose events: 0 Feb 12 22:12:43.648998 kernel: ... event mask: 000000000000000f Feb 12 22:12:43.649003 kernel: signal: max sigframe size: 1776 Feb 12 22:12:43.649008 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:12:43.649014 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 22:12:43.649019 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:12:43.649025 kernel: x86: Booting SMP configuration: Feb 12 22:12:43.649031 kernel: .... node #0, CPUs: #1 Feb 12 22:12:43.649036 kernel: Disabled fast string operations Feb 12 22:12:43.649041 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Feb 12 22:12:43.649046 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Feb 12 22:12:43.649051 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 22:12:43.649057 kernel: smpboot: Max logical packages: 128 Feb 12 22:12:43.649062 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Feb 12 22:12:43.649067 kernel: devtmpfs: initialized Feb 12 22:12:43.649072 kernel: x86/mm: Memory block size: 128MB Feb 12 22:12:43.649079 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Feb 12 22:12:43.649084 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:12:43.649090 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Feb 12 22:12:43.649095 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:12:43.649100 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:12:43.649106 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:12:43.649111 kernel: audit: type=2000 audit(1707775962.056:1): state=initialized audit_enabled=0 res=1 Feb 12 22:12:43.649116 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:12:43.649121 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:12:43.649128 kernel: cpuidle: using governor menu Feb 12 22:12:43.649133 kernel: Simple Boot Flag at 0x36 set to 0x80 Feb 12 22:12:43.649139 kernel: ACPI: bus type PCI registered Feb 12 22:12:43.649144 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:12:43.649150 kernel: dca service started, version 1.12.1 Feb 12 22:12:43.649155 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Feb 12 22:12:43.649160 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Feb 12 22:12:43.649165 kernel: PCI: Using configuration type 1 for base access Feb 12 22:12:43.649171 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:12:43.649177 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:12:43.649182 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:12:43.649188 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:12:43.649193 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:12:43.649198 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:12:43.649203 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:12:43.649208 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:12:43.649214 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:12:43.649219 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:12:43.649225 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 22:12:43.649231 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 12 22:12:43.649236 kernel: ACPI: Interpreter enabled Feb 12 22:12:43.649241 kernel: ACPI: PM: (supports S0 S1 S5) Feb 12 22:12:43.649246 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:12:43.649252 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:12:43.649258 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Feb 12 22:12:43.649264 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Feb 12 22:12:43.649335 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:12:43.649385 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Feb 12 22:12:43.649426 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Feb 12 22:12:43.649434 kernel: PCI host bridge to bus 0000:00 Feb 12 22:12:43.649571 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:12:43.649618 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Feb 12 22:12:43.649657 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Feb 12 22:12:43.649697 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Feb 12 22:12:43.649773 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Feb 12 22:12:43.649823 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 12 22:12:43.650405 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:12:43.650448 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Feb 12 22:12:43.650487 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Feb 12 22:12:43.650539 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Feb 12 22:12:43.650594 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Feb 12 22:12:43.650643 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Feb 12 22:12:43.650690 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Feb 12 22:12:43.650735 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Feb 12 22:12:43.650779 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 22:12:43.654877 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 22:12:43.654930 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 22:12:43.654976 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 22:12:43.655025 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Feb 12 22:12:43.655069 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Feb 12 22:12:43.655112 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Feb 12 22:12:43.655158 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Feb 12 22:12:43.655201 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Feb 12 22:12:43.655245 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Feb 12 22:12:43.655293 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Feb 12 22:12:43.655336 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Feb 12 22:12:43.655378 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Feb 12 22:12:43.655420 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Feb 12 22:12:43.655461 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Feb 12 22:12:43.655504 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:12:43.655551 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Feb 12 22:12:43.655601 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.655645 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.655691 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.655738 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.655786 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.655840 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.655888 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.655930 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.655978 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656021 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656067 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656113 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656158 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656203 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656248 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656292 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656338 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656383 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656430 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656473 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656522 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656565 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656611 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656658 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656704 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656749 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656804 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656855 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656903 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.656949 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.656997 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657040 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657086 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657129 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657176 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657221 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657270 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657314 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657360 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657404 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657451 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657496 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657543 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657587 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657632 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657676 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657722 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657767 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657823 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657867 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.657914 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.657958 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658005 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.658048 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658099 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.658143 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658190 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.658232 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658280 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.658324 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658373 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.658416 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658464 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Feb 12 22:12:43.658507 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.658552 kernel: pci_bus 0000:01: extended config space not accessible Feb 12 22:12:43.658596 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 22:12:43.658644 kernel: pci_bus 0000:02: extended config space not accessible Feb 12 22:12:43.658652 kernel: acpiphp: Slot [32] registered Feb 12 22:12:43.658658 kernel: acpiphp: Slot [33] registered Feb 12 22:12:43.658663 kernel: acpiphp: Slot [34] registered Feb 12 22:12:43.658668 kernel: acpiphp: Slot [35] registered Feb 12 22:12:43.658674 kernel: acpiphp: Slot [36] registered Feb 12 22:12:43.658679 kernel: acpiphp: Slot [37] registered Feb 12 22:12:43.658684 kernel: acpiphp: Slot [38] registered Feb 12 22:12:43.658689 kernel: acpiphp: Slot [39] registered Feb 12 22:12:43.658696 kernel: acpiphp: Slot [40] registered Feb 12 22:12:43.658701 kernel: acpiphp: Slot [41] registered Feb 12 22:12:43.658709 kernel: acpiphp: Slot [42] registered Feb 12 22:12:43.658714 kernel: acpiphp: Slot [43] registered Feb 12 22:12:43.658720 kernel: acpiphp: Slot [44] registered Feb 12 22:12:43.658725 kernel: acpiphp: Slot [45] registered Feb 12 22:12:43.658730 kernel: acpiphp: Slot [46] registered Feb 12 22:12:43.658735 kernel: acpiphp: Slot [47] registered Feb 12 22:12:43.658741 kernel: acpiphp: Slot [48] registered Feb 12 22:12:43.658746 kernel: acpiphp: Slot [49] registered Feb 12 22:12:43.658752 kernel: acpiphp: Slot [50] registered Feb 12 22:12:43.658757 kernel: acpiphp: Slot [51] registered Feb 12 22:12:43.658762 kernel: acpiphp: Slot [52] registered Feb 12 22:12:43.658767 kernel: acpiphp: Slot [53] registered Feb 12 22:12:43.658772 kernel: acpiphp: Slot [54] registered Feb 12 22:12:43.658778 kernel: acpiphp: Slot [55] registered Feb 12 22:12:43.658783 kernel: acpiphp: Slot [56] registered Feb 12 22:12:43.658788 kernel: acpiphp: Slot [57] registered Feb 12 22:12:43.658793 kernel: acpiphp: Slot [58] registered Feb 12 22:12:43.658808 kernel: acpiphp: Slot [59] registered Feb 12 22:12:43.658813 kernel: acpiphp: Slot [60] registered Feb 12 22:12:43.658818 kernel: acpiphp: Slot [61] registered Feb 12 22:12:43.658824 kernel: acpiphp: Slot [62] registered Feb 12 22:12:43.658829 kernel: acpiphp: Slot [63] registered Feb 12 22:12:43.658878 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Feb 12 22:12:43.658921 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 12 22:12:43.658964 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 12 22:12:43.659006 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 22:12:43.659050 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Feb 12 22:12:43.659093 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Feb 12 22:12:43.659135 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Feb 12 22:12:43.659177 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Feb 12 22:12:43.659219 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Feb 12 22:12:43.659261 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Feb 12 22:12:43.659303 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Feb 12 22:12:43.659347 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Feb 12 22:12:43.659399 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Feb 12 22:12:43.659444 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Feb 12 22:12:43.659488 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Feb 12 22:12:43.659532 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 12 22:12:43.659576 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 12 22:12:43.659619 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 12 22:12:43.659666 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 12 22:12:43.659715 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 12 22:12:43.659779 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 12 22:12:43.659830 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 12 22:12:43.659874 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 12 22:12:43.659917 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 12 22:12:43.659960 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 22:12:43.660003 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 12 22:12:43.660048 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 12 22:12:43.660092 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 12 22:12:43.660136 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 22:12:43.660180 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 12 22:12:43.660223 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 12 22:12:43.660267 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 22:12:43.660313 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 12 22:12:43.660356 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 12 22:12:43.660399 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 22:12:43.660442 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 12 22:12:43.660485 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 12 22:12:43.660529 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 22:12:43.660575 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 12 22:12:43.660617 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 12 22:12:43.660659 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 22:12:43.660702 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 12 22:12:43.660745 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 12 22:12:43.660788 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 22:12:43.660849 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Feb 12 22:12:43.660896 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Feb 12 22:12:43.660944 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Feb 12 22:12:43.660988 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Feb 12 22:12:43.661033 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Feb 12 22:12:43.661077 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Feb 12 22:12:43.661121 kernel: pci 0000:0b:00.0: supports D1 D2 Feb 12 22:12:43.661166 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 22:12:43.661210 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Feb 12 22:12:43.661270 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 12 22:12:43.661313 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 12 22:12:43.661357 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 12 22:12:43.661400 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 12 22:12:43.661443 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 12 22:12:43.661485 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 12 22:12:43.661528 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 22:12:43.661571 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 12 22:12:43.661614 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 12 22:12:43.661656 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 12 22:12:43.661698 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 22:12:43.666926 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 12 22:12:43.666987 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 12 22:12:43.667034 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 22:12:43.667079 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 12 22:12:43.667123 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 12 22:12:43.667168 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 22:12:43.667214 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 12 22:12:43.667273 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 12 22:12:43.667315 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 22:12:43.667368 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 12 22:12:43.667430 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 12 22:12:43.667491 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 22:12:43.667554 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 12 22:12:43.667613 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 12 22:12:43.667663 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 22:12:43.667709 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 12 22:12:43.667763 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 12 22:12:43.667818 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 12 22:12:43.667862 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 22:12:43.667905 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 12 22:12:43.667951 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 12 22:12:43.667992 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 12 22:12:43.668036 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 22:12:43.668078 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 12 22:12:43.668121 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 12 22:12:43.668163 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 12 22:12:43.668205 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 22:12:43.668248 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 12 22:12:43.668293 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 12 22:12:43.668334 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 22:12:43.668377 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 12 22:12:43.668419 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 12 22:12:43.668461 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 22:12:43.668504 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 12 22:12:43.668545 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 12 22:12:43.668587 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 22:12:43.668631 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 12 22:12:43.668672 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 12 22:12:43.668717 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 22:12:43.668761 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 12 22:12:43.668809 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 12 22:12:43.668852 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 22:12:43.668895 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 12 22:12:43.668937 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 12 22:12:43.668981 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 12 22:12:43.669022 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 22:12:43.669064 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 12 22:12:43.669106 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 12 22:12:43.669149 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 12 22:12:43.669191 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 22:12:43.669234 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 12 22:12:43.669278 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 12 22:12:43.669320 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 22:12:43.669361 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 12 22:12:43.669403 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 12 22:12:43.669445 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 22:12:43.669487 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 12 22:12:43.669529 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 12 22:12:43.669571 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 22:12:43.669615 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 12 22:12:43.669657 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 12 22:12:43.669698 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 22:12:43.669766 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 12 22:12:43.669834 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 12 22:12:43.669879 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 22:12:43.669921 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 12 22:12:43.669963 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 12 22:12:43.670005 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 22:12:43.670014 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Feb 12 22:12:43.670020 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Feb 12 22:12:43.670025 kernel: ACPI: PCI: Interrupt link LNKB disabled Feb 12 22:12:43.670031 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 22:12:43.670036 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Feb 12 22:12:43.670041 kernel: iommu: Default domain type: Translated Feb 12 22:12:43.670046 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:12:43.670088 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Feb 12 22:12:43.670132 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:12:43.670176 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Feb 12 22:12:43.670183 kernel: vgaarb: loaded Feb 12 22:12:43.670189 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:12:43.670194 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:12:43.670200 kernel: PTP clock support registered Feb 12 22:12:43.670205 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:12:43.670210 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:12:43.670215 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Feb 12 22:12:43.670222 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Feb 12 22:12:43.670228 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Feb 12 22:12:43.670233 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Feb 12 22:12:43.670238 kernel: clocksource: Switched to clocksource tsc-early Feb 12 22:12:43.670243 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:12:43.670249 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:12:43.670254 kernel: pnp: PnP ACPI init Feb 12 22:12:43.670300 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Feb 12 22:12:43.670340 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Feb 12 22:12:43.672106 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Feb 12 22:12:43.672162 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Feb 12 22:12:43.672210 kernel: pnp 00:06: [dma 2] Feb 12 22:12:43.672258 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Feb 12 22:12:43.672300 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Feb 12 22:12:43.672343 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Feb 12 22:12:43.672352 kernel: pnp: PnP ACPI: found 8 devices Feb 12 22:12:43.672358 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:12:43.672364 kernel: NET: Registered PF_INET protocol family Feb 12 22:12:43.672369 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 22:12:43.672375 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 22:12:43.672380 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:12:43.672386 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 22:12:43.672391 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:12:43.672396 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 22:12:43.672403 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:12:43.672408 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:12:43.672413 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:12:43.672419 kernel: NET: Registered PF_XDP protocol family Feb 12 22:12:43.672469 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Feb 12 22:12:43.672518 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Feb 12 22:12:43.672568 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Feb 12 22:12:43.672618 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Feb 12 22:12:43.672667 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Feb 12 22:12:43.672718 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Feb 12 22:12:43.672765 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Feb 12 22:12:43.674346 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Feb 12 22:12:43.674396 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Feb 12 22:12:43.674442 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Feb 12 22:12:43.674485 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Feb 12 22:12:43.674528 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Feb 12 22:12:43.674570 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Feb 12 22:12:43.674612 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Feb 12 22:12:43.674655 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Feb 12 22:12:43.674699 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Feb 12 22:12:43.674741 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Feb 12 22:12:43.674782 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Feb 12 22:12:43.674832 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Feb 12 22:12:43.674876 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Feb 12 22:12:43.674918 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Feb 12 22:12:43.674964 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Feb 12 22:12:43.675005 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Feb 12 22:12:43.675048 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 22:12:43.675090 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 22:12:43.675133 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675175 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675219 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675260 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675302 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675343 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675386 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675428 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675470 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675511 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675555 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675598 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675640 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675682 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675753 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675825 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675869 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675911 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.675956 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.675999 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676041 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676083 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676125 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676166 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676208 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676250 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676292 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676337 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676379 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676421 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676463 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676506 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676547 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676590 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676632 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676677 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676720 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676763 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676812 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676855 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676897 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.676939 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.676981 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677026 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677069 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677111 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677153 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677195 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677237 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677279 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677322 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677364 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677408 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677450 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677493 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677534 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677575 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677635 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677691 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677733 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677775 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677824 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677869 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677911 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.677952 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.677994 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678036 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678078 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678120 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678161 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678204 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678248 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678290 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678331 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678374 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678416 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678457 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678499 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678549 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678592 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678634 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678679 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678725 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Feb 12 22:12:43.678767 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Feb 12 22:12:43.678817 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 12 22:12:43.678859 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Feb 12 22:12:43.678902 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Feb 12 22:12:43.678943 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Feb 12 22:12:43.678985 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 22:12:43.679032 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Feb 12 22:12:43.679076 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Feb 12 22:12:43.679118 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Feb 12 22:12:43.679161 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Feb 12 22:12:43.679204 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 22:12:43.679246 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Feb 12 22:12:43.679289 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Feb 12 22:12:43.679331 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Feb 12 22:12:43.679373 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 22:12:43.679417 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Feb 12 22:12:43.679460 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Feb 12 22:12:43.679502 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Feb 12 22:12:43.679544 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 22:12:43.679586 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Feb 12 22:12:43.679628 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Feb 12 22:12:43.679669 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 22:12:43.679720 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Feb 12 22:12:43.685828 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Feb 12 22:12:43.685886 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 22:12:43.685933 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Feb 12 22:12:43.685978 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Feb 12 22:12:43.686022 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 22:12:43.686065 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Feb 12 22:12:43.686107 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Feb 12 22:12:43.686152 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 22:12:43.686195 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Feb 12 22:12:43.686237 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Feb 12 22:12:43.686280 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 22:12:43.686325 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Feb 12 22:12:43.686368 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Feb 12 22:12:43.686409 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Feb 12 22:12:43.686451 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Feb 12 22:12:43.686493 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 22:12:43.686539 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Feb 12 22:12:43.686582 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Feb 12 22:12:43.686624 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Feb 12 22:12:43.686667 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 22:12:43.686713 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Feb 12 22:12:43.686755 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Feb 12 22:12:43.686808 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Feb 12 22:12:43.686854 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 22:12:43.686896 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Feb 12 22:12:43.686939 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Feb 12 22:12:43.686984 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 22:12:43.687026 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Feb 12 22:12:43.687069 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Feb 12 22:12:43.687111 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 22:12:43.687153 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Feb 12 22:12:43.687195 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Feb 12 22:12:43.687236 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 22:12:43.687278 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Feb 12 22:12:43.687320 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Feb 12 22:12:43.687365 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 22:12:43.687407 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Feb 12 22:12:43.687450 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Feb 12 22:12:43.687492 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 22:12:43.687534 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Feb 12 22:12:43.687576 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Feb 12 22:12:43.687618 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Feb 12 22:12:43.687660 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 22:12:43.687702 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Feb 12 22:12:43.687778 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Feb 12 22:12:43.687830 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Feb 12 22:12:43.687872 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 22:12:43.687915 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Feb 12 22:12:43.687957 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Feb 12 22:12:43.687999 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Feb 12 22:12:43.688042 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 22:12:43.688084 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Feb 12 22:12:43.688126 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Feb 12 22:12:43.688168 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 22:12:43.688212 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Feb 12 22:12:43.688254 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Feb 12 22:12:43.688296 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 22:12:43.688337 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Feb 12 22:12:43.688380 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Feb 12 22:12:43.688422 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 22:12:43.688464 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Feb 12 22:12:43.688507 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Feb 12 22:12:43.688548 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 22:12:43.688590 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Feb 12 22:12:43.688633 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Feb 12 22:12:43.688675 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 22:12:43.688736 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Feb 12 22:12:43.688792 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Feb 12 22:12:43.696959 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Feb 12 22:12:43.697007 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 22:12:43.697053 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Feb 12 22:12:43.697097 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Feb 12 22:12:43.697140 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Feb 12 22:12:43.697186 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 22:12:43.697229 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Feb 12 22:12:43.697272 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Feb 12 22:12:43.697314 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 22:12:43.697357 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Feb 12 22:12:43.697399 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Feb 12 22:12:43.697441 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 22:12:43.697484 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Feb 12 22:12:43.697526 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Feb 12 22:12:43.697567 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 22:12:43.697613 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Feb 12 22:12:43.697655 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Feb 12 22:12:43.697697 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 22:12:43.697769 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Feb 12 22:12:43.697826 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Feb 12 22:12:43.697870 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 22:12:43.697912 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Feb 12 22:12:43.697955 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Feb 12 22:12:43.697997 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 22:12:43.698041 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Feb 12 22:12:43.698078 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Feb 12 22:12:43.698115 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 12 22:12:43.698151 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 12 22:12:43.698188 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 12 22:12:43.698225 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 12 22:12:43.698263 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Feb 12 22:12:43.698303 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Feb 12 22:12:43.698345 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Feb 12 22:12:43.698385 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Feb 12 22:12:43.698423 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Feb 12 22:12:43.698462 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Feb 12 22:12:43.698501 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Feb 12 22:12:43.698540 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Feb 12 22:12:43.698581 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Feb 12 22:12:43.698620 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Feb 12 22:12:43.698658 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Feb 12 22:12:43.698697 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Feb 12 22:12:43.698735 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Feb 12 22:12:43.698778 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Feb 12 22:12:43.698832 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Feb 12 22:12:43.698873 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Feb 12 22:12:43.698937 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Feb 12 22:12:43.698978 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Feb 12 22:12:43.699018 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Feb 12 22:12:43.699062 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Feb 12 22:12:43.699102 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Feb 12 22:12:43.699141 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Feb 12 22:12:43.699184 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Feb 12 22:12:43.699228 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Feb 12 22:12:43.699275 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Feb 12 22:12:43.699316 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Feb 12 22:12:43.699362 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Feb 12 22:12:43.699411 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Feb 12 22:12:43.699458 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Feb 12 22:12:43.699499 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Feb 12 22:12:43.699544 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Feb 12 22:12:43.699585 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Feb 12 22:12:43.699630 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Feb 12 22:12:43.699671 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Feb 12 22:12:43.699716 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Feb 12 22:12:43.699764 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Feb 12 22:12:43.699818 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Feb 12 22:12:43.699861 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Feb 12 22:12:43.699905 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Feb 12 22:12:43.699959 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Feb 12 22:12:43.699999 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Feb 12 22:12:43.700047 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Feb 12 22:12:43.700087 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Feb 12 22:12:43.700131 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Feb 12 22:12:43.700170 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Feb 12 22:12:43.700213 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Feb 12 22:12:43.700253 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Feb 12 22:12:43.700296 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Feb 12 22:12:43.700338 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Feb 12 22:12:43.700382 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Feb 12 22:12:43.700422 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Feb 12 22:12:43.700466 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Feb 12 22:12:43.700505 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Feb 12 22:12:43.700544 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Feb 12 22:12:43.700592 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Feb 12 22:12:43.700633 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Feb 12 22:12:43.700673 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Feb 12 22:12:43.700731 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Feb 12 22:12:43.700772 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Feb 12 22:12:43.700842 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Feb 12 22:12:43.700888 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Feb 12 22:12:43.700931 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Feb 12 22:12:43.700975 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Feb 12 22:12:43.701015 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Feb 12 22:12:43.701059 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Feb 12 22:12:43.701099 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Feb 12 22:12:43.701143 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Feb 12 22:12:43.701186 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Feb 12 22:12:43.701236 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Feb 12 22:12:43.701277 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Feb 12 22:12:43.701321 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Feb 12 22:12:43.701363 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Feb 12 22:12:43.701403 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Feb 12 22:12:43.701450 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Feb 12 22:12:43.701491 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Feb 12 22:12:43.701531 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Feb 12 22:12:43.701575 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Feb 12 22:12:43.701615 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Feb 12 22:12:43.701659 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Feb 12 22:12:43.701702 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Feb 12 22:12:43.701788 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Feb 12 22:12:43.701848 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Feb 12 22:12:43.701897 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Feb 12 22:12:43.701938 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Feb 12 22:12:43.701982 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Feb 12 22:12:43.702025 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Feb 12 22:12:43.702070 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Feb 12 22:12:43.702111 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Feb 12 22:12:43.702159 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 22:12:43.702167 kernel: PCI: CLS 32 bytes, default 64 Feb 12 22:12:43.702174 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 22:12:43.702180 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 12 22:12:43.702186 kernel: clocksource: Switched to clocksource tsc Feb 12 22:12:43.702193 kernel: Initialise system trusted keyrings Feb 12 22:12:43.702199 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 22:12:43.702205 kernel: Key type asymmetric registered Feb 12 22:12:43.702211 kernel: Asymmetric key parser 'x509' registered Feb 12 22:12:43.702216 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:12:43.702223 kernel: io scheduler mq-deadline registered Feb 12 22:12:43.702229 kernel: io scheduler kyber registered Feb 12 22:12:43.702234 kernel: io scheduler bfq registered Feb 12 22:12:43.702278 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Feb 12 22:12:43.702327 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702372 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Feb 12 22:12:43.702430 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702474 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Feb 12 22:12:43.702518 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702562 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Feb 12 22:12:43.702606 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702651 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Feb 12 22:12:43.702695 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702749 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Feb 12 22:12:43.702834 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702886 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Feb 12 22:12:43.702932 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.702975 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Feb 12 22:12:43.703017 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703062 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Feb 12 22:12:43.703104 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703147 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Feb 12 22:12:43.703191 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703233 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Feb 12 22:12:43.703275 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703317 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Feb 12 22:12:43.703359 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703402 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Feb 12 22:12:43.703446 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703488 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Feb 12 22:12:43.703531 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703573 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Feb 12 22:12:43.703615 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703660 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Feb 12 22:12:43.703703 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.703777 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Feb 12 22:12:43.704863 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.704916 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Feb 12 22:12:43.704962 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705006 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Feb 12 22:12:43.705052 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705096 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Feb 12 22:12:43.705140 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705182 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Feb 12 22:12:43.705225 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705268 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Feb 12 22:12:43.705313 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705356 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Feb 12 22:12:43.705398 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705443 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Feb 12 22:12:43.705487 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705532 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Feb 12 22:12:43.705574 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705617 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Feb 12 22:12:43.705659 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705701 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Feb 12 22:12:43.705749 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.705793 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Feb 12 22:12:43.706871 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.706919 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Feb 12 22:12:43.706964 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.707009 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Feb 12 22:12:43.707052 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.707100 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Feb 12 22:12:43.707143 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.707186 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Feb 12 22:12:43.707229 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Feb 12 22:12:43.707237 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:12:43.707244 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:12:43.707250 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:12:43.707256 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Feb 12 22:12:43.707262 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 22:12:43.707268 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 22:12:43.707314 kernel: rtc_cmos 00:01: registered as rtc0 Feb 12 22:12:43.707355 kernel: rtc_cmos 00:01: setting system clock to 2024-02-12T22:12:43 UTC (1707775963) Feb 12 22:12:43.707394 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Feb 12 22:12:43.707403 kernel: fail to initialize ptp_kvm Feb 12 22:12:43.707409 kernel: intel_pstate: CPU model not supported Feb 12 22:12:43.707415 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:12:43.707421 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 22:12:43.707426 kernel: Segment Routing with IPv6 Feb 12 22:12:43.707432 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:12:43.707437 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:12:43.707443 kernel: Key type dns_resolver registered Feb 12 22:12:43.707449 kernel: IPI shorthand broadcast: enabled Feb 12 22:12:43.707456 kernel: sched_clock: Marking stable (814232071, 207898719)->(1078030150, -55899360) Feb 12 22:12:43.707462 kernel: registered taskstats version 1 Feb 12 22:12:43.707467 kernel: Loading compiled-in X.509 certificates Feb 12 22:12:43.707473 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:12:43.707478 kernel: Key type .fscrypt registered Feb 12 22:12:43.707484 kernel: Key type fscrypt-provisioning registered Feb 12 22:12:43.707490 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 22:12:43.707495 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:12:43.707501 kernel: ima: No architecture policies found Feb 12 22:12:43.707507 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:12:43.707513 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:12:43.707519 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:12:43.707524 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:12:43.707530 kernel: Run /init as init process Feb 12 22:12:43.707535 kernel: with arguments: Feb 12 22:12:43.707541 kernel: /init Feb 12 22:12:43.707547 kernel: with environment: Feb 12 22:12:43.707552 kernel: HOME=/ Feb 12 22:12:43.707559 kernel: TERM=linux Feb 12 22:12:43.707564 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:12:43.707571 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:12:43.707579 systemd[1]: Detected virtualization vmware. Feb 12 22:12:43.707585 systemd[1]: Detected architecture x86-64. Feb 12 22:12:43.707590 systemd[1]: Running in initrd. Feb 12 22:12:43.707596 systemd[1]: No hostname configured, using default hostname. Feb 12 22:12:43.707602 systemd[1]: Hostname set to . Feb 12 22:12:43.707610 systemd[1]: Initializing machine ID from random generator. Feb 12 22:12:43.707615 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:12:43.707621 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:12:43.707627 systemd[1]: Reached target cryptsetup.target. Feb 12 22:12:43.707632 systemd[1]: Reached target paths.target. Feb 12 22:12:43.707639 systemd[1]: Reached target slices.target. Feb 12 22:12:43.707644 systemd[1]: Reached target swap.target. Feb 12 22:12:43.707650 systemd[1]: Reached target timers.target. Feb 12 22:12:43.707657 systemd[1]: Listening on iscsid.socket. Feb 12 22:12:43.707663 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:12:43.707669 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:12:43.707675 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:12:43.707681 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:12:43.707687 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:12:43.707693 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:12:43.707698 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:12:43.707705 systemd[1]: Reached target sockets.target. Feb 12 22:12:43.707711 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:12:43.707717 systemd[1]: Finished network-cleanup.service. Feb 12 22:12:43.707723 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:12:43.707747 systemd[1]: Starting systemd-journald.service... Feb 12 22:12:43.707753 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:12:43.707759 systemd[1]: Starting systemd-resolved.service... Feb 12 22:12:43.707778 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:12:43.707784 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:12:43.707790 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:12:43.708817 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:12:43.708826 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:12:43.708833 kernel: audit: type=1130 audit(1707775963.641:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.708840 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:12:43.708845 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:12:43.708852 kernel: audit: type=1130 audit(1707775963.661:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.708858 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:12:43.708866 kernel: audit: type=1130 audit(1707775963.666:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.708872 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:12:43.708878 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:12:43.708884 kernel: Bridge firewalling registered Feb 12 22:12:43.708889 systemd[1]: Started systemd-resolved.service. Feb 12 22:12:43.708895 systemd[1]: Reached target nss-lookup.target. Feb 12 22:12:43.708903 kernel: audit: type=1130 audit(1707775963.692:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.708908 kernel: SCSI subsystem initialized Feb 12 22:12:43.708917 systemd-journald[216]: Journal started Feb 12 22:12:43.708949 systemd-journald[216]: Runtime Journal (/run/log/journal/9093b88d6e634e40abea72f3d7ac88dc) is 4.8M, max 38.8M, 34.0M free. Feb 12 22:12:43.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.643536 systemd-modules-load[217]: Inserted module 'overlay' Feb 12 22:12:43.709942 systemd[1]: Started systemd-journald.service. Feb 12 22:12:43.681548 systemd-modules-load[217]: Inserted module 'br_netfilter' Feb 12 22:12:43.719235 kernel: audit: type=1130 audit(1707775963.708:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.719246 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:12:43.719256 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:12:43.719263 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:12:43.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.687623 systemd-resolved[218]: Positive Trust Anchors: Feb 12 22:12:43.687628 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:12:43.687646 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:12:43.692317 systemd-resolved[218]: Defaulting to hostname 'linux'. Feb 12 22:12:43.720356 dracut-cmdline[233]: dracut-dracut-053 Feb 12 22:12:43.720356 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 12 22:12:43.720356 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:12:43.721098 systemd-modules-load[217]: Inserted module 'dm_multipath' Feb 12 22:12:43.721915 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:12:43.721893 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:12:43.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.722311 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:12:43.724889 kernel: audit: type=1130 audit(1707775963.720:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.730879 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:12:43.733862 kernel: audit: type=1130 audit(1707775963.729:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.733873 kernel: iscsi: registered transport (tcp) Feb 12 22:12:43.746837 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:12:43.746855 kernel: QLogic iSCSI HBA Driver Feb 12 22:12:43.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.762537 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:12:43.766184 kernel: audit: type=1130 audit(1707775963.760:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:43.763059 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:12:43.798839 kernel: raid6: avx2x4 gen() 51336 MB/s Feb 12 22:12:43.815840 kernel: raid6: avx2x4 xor() 22636 MB/s Feb 12 22:12:43.832844 kernel: raid6: avx2x2 gen() 56427 MB/s Feb 12 22:12:43.849816 kernel: raid6: avx2x2 xor() 33719 MB/s Feb 12 22:12:43.866840 kernel: raid6: avx2x1 gen() 47267 MB/s Feb 12 22:12:43.883810 kernel: raid6: avx2x1 xor() 29321 MB/s Feb 12 22:12:43.900842 kernel: raid6: sse2x4 gen() 22400 MB/s Feb 12 22:12:43.917839 kernel: raid6: sse2x4 xor() 12346 MB/s Feb 12 22:12:43.934840 kernel: raid6: sse2x2 gen() 22743 MB/s Feb 12 22:12:43.951839 kernel: raid6: sse2x2 xor() 14028 MB/s Feb 12 22:12:43.968841 kernel: raid6: sse2x1 gen() 19331 MB/s Feb 12 22:12:43.986023 kernel: raid6: sse2x1 xor() 9279 MB/s Feb 12 22:12:43.986039 kernel: raid6: using algorithm avx2x2 gen() 56427 MB/s Feb 12 22:12:43.986046 kernel: raid6: .... xor() 33719 MB/s, rmw enabled Feb 12 22:12:43.987148 kernel: raid6: using avx2x2 recovery algorithm Feb 12 22:12:43.994807 kernel: xor: automatically using best checksumming function avx Feb 12 22:12:44.050813 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:12:44.055401 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:12:44.057806 kernel: audit: type=1130 audit(1707775964.053:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:44.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:44.055000 audit: BPF prog-id=7 op=LOAD Feb 12 22:12:44.056000 audit: BPF prog-id=8 op=LOAD Feb 12 22:12:44.058045 systemd[1]: Starting systemd-udevd.service... Feb 12 22:12:44.065957 systemd-udevd[415]: Using default interface naming scheme 'v252'. Feb 12 22:12:44.068680 systemd[1]: Started systemd-udevd.service. Feb 12 22:12:44.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:44.069151 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:12:44.076414 dracut-pre-trigger[418]: rd.md=0: removing MD RAID activation Feb 12 22:12:44.090340 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:12:44.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:44.090834 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:12:44.145458 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:12:44.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:44.205808 kernel: VMware PVSCSI driver - version 1.0.7.0-k Feb 12 22:12:44.214805 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Feb 12 22:12:44.215807 kernel: libata version 3.00 loaded. Feb 12 22:12:44.221830 kernel: vmw_pvscsi: using 64bit dma Feb 12 22:12:44.221850 kernel: vmw_pvscsi: max_id: 16 Feb 12 22:12:44.221858 kernel: vmw_pvscsi: setting ring_pages to 8 Feb 12 22:12:44.223187 kernel: ata_piix 0000:00:07.1: version 2.13 Feb 12 22:12:44.223349 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Feb 12 22:12:44.228072 kernel: vmw_pvscsi: enabling reqCallThreshold Feb 12 22:12:44.228093 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Feb 12 22:12:44.228171 kernel: vmw_pvscsi: driver-based request coalescing enabled Feb 12 22:12:44.228180 kernel: vmw_pvscsi: using MSI-X Feb 12 22:12:44.228806 kernel: scsi host0: ata_piix Feb 12 22:12:44.232242 kernel: scsi host2: ata_piix Feb 12 22:12:44.232314 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Feb 12 22:12:44.232323 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Feb 12 22:12:44.237806 kernel: scsi host1: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Feb 12 22:12:44.242812 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #1 Feb 12 22:12:44.244808 kernel: scsi 1:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Feb 12 22:12:44.244842 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:12:44.246807 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Feb 12 22:12:44.399822 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Feb 12 22:12:44.405813 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Feb 12 22:12:44.414807 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:12:44.414828 kernel: AES CTR mode by8 optimization enabled Feb 12 22:12:44.426970 kernel: sd 1:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Feb 12 22:12:44.427050 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 12 22:12:44.427109 kernel: sd 1:0:0:0: [sda] Mode Sense: 31 00 00 00 Feb 12 22:12:44.428465 kernel: sd 1:0:0:0: [sda] Cache data unavailable Feb 12 22:12:44.428528 kernel: sd 1:0:0:0: [sda] Assuming drive cache: write through Feb 12 22:12:44.433021 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:12:44.433040 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 12 22:12:44.440411 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Feb 12 22:12:44.440522 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 22:12:44.457954 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Feb 12 22:12:44.483811 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (462) Feb 12 22:12:44.486369 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:12:44.489888 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:12:44.493862 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:12:44.495477 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:12:44.495751 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:12:44.496429 systemd[1]: Starting disk-uuid.service... Feb 12 22:12:44.520813 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:12:44.527815 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:12:45.530855 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 22:12:45.530898 disk-uuid[550]: The operation has completed successfully. Feb 12 22:12:45.574166 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:12:45.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.574222 systemd[1]: Finished disk-uuid.service. Feb 12 22:12:45.574774 systemd[1]: Starting verity-setup.service... Feb 12 22:12:45.584869 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:12:45.623770 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:12:45.624376 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:12:45.624592 systemd[1]: Finished verity-setup.service. Feb 12 22:12:45.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.677850 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:12:45.676610 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:12:45.677133 systemd[1]: Starting afterburn-network-kargs.service... Feb 12 22:12:45.677563 systemd[1]: Starting ignition-setup.service... Feb 12 22:12:45.693485 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:12:45.693507 kernel: BTRFS info (device sda6): using free space tree Feb 12 22:12:45.693515 kernel: BTRFS info (device sda6): has skinny extents Feb 12 22:12:45.699829 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 22:12:45.706313 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 22:12:45.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.715476 systemd[1]: Finished ignition-setup.service. Feb 12 22:12:45.716065 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:12:45.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.758686 systemd[1]: Finished afterburn-network-kargs.service. Feb 12 22:12:45.759176 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:12:45.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.805000 audit: BPF prog-id=9 op=LOAD Feb 12 22:12:45.806945 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:12:45.807755 systemd[1]: Starting systemd-networkd.service... Feb 12 22:12:45.820765 systemd-networkd[735]: lo: Link UP Feb 12 22:12:45.820770 systemd-networkd[735]: lo: Gained carrier Feb 12 22:12:45.821026 systemd-networkd[735]: Enumeration completed Feb 12 22:12:45.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.821218 systemd[1]: Started systemd-networkd.service. Feb 12 22:12:45.821289 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Feb 12 22:12:45.821353 systemd[1]: Reached target network.target. Feb 12 22:12:45.821983 systemd[1]: Starting iscsiuio.service... Feb 12 22:12:45.825549 systemd[1]: Started iscsiuio.service. Feb 12 22:12:45.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.827179 systemd[1]: Starting iscsid.service... Feb 12 22:12:45.828291 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 12 22:12:45.828386 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 12 22:12:45.830565 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:12:45.830565 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:12:45.830565 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:12:45.830565 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:12:45.830565 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:12:45.831686 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:12:45.832367 systemd[1]: Started iscsid.service. Feb 12 22:12:45.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.832632 systemd-networkd[735]: ens192: Link UP Feb 12 22:12:45.832635 systemd-networkd[735]: ens192: Gained carrier Feb 12 22:12:45.833355 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:12:45.839574 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:12:45.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.839895 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:12:45.840126 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:12:45.840335 systemd[1]: Reached target remote-fs.target. Feb 12 22:12:45.841176 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:12:45.846198 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:12:45.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.849096 ignition[607]: Ignition 2.14.0 Feb 12 22:12:45.849349 ignition[607]: Stage: fetch-offline Feb 12 22:12:45.849549 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:12:45.849769 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:12:45.853208 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:12:45.853469 ignition[607]: parsed url from cmdline: "" Feb 12 22:12:45.853517 ignition[607]: no config URL provided Feb 12 22:12:45.853661 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:12:45.853844 ignition[607]: no config at "/usr/lib/ignition/user.ign" Feb 12 22:12:45.854470 ignition[607]: config successfully fetched Feb 12 22:12:45.854540 ignition[607]: parsing config with SHA512: 03883bcc9e12d402aecc0b8e97e4cf603b0521052313a8d89cc05895c499ed3eff88d4e8e3bd6891340a18fb7635fe9dc432291aaba3d564a4403c8ea468a9a0 Feb 12 22:12:45.891935 unknown[607]: fetched base config from "system" Feb 12 22:12:45.891943 unknown[607]: fetched user config from "vmware" Feb 12 22:12:45.892626 ignition[607]: fetch-offline: fetch-offline passed Feb 12 22:12:45.892804 ignition[607]: Ignition finished successfully Feb 12 22:12:45.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.893462 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:12:45.893604 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 22:12:45.894071 systemd[1]: Starting ignition-kargs.service... Feb 12 22:12:45.899031 ignition[755]: Ignition 2.14.0 Feb 12 22:12:45.899217 ignition[755]: Stage: kargs Feb 12 22:12:45.899380 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:12:45.899528 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:12:45.900828 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:12:45.902378 ignition[755]: kargs: kargs passed Feb 12 22:12:45.902406 ignition[755]: Ignition finished successfully Feb 12 22:12:45.903213 systemd[1]: Finished ignition-kargs.service. Feb 12 22:12:45.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.903735 systemd[1]: Starting ignition-disks.service... Feb 12 22:12:45.907708 ignition[761]: Ignition 2.14.0 Feb 12 22:12:45.907916 ignition[761]: Stage: disks Feb 12 22:12:45.908074 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:12:45.908362 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:12:45.909550 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:12:45.911141 ignition[761]: disks: disks passed Feb 12 22:12:45.911178 ignition[761]: Ignition finished successfully Feb 12 22:12:45.911694 systemd[1]: Finished ignition-disks.service. Feb 12 22:12:45.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.911950 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:12:45.912074 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:12:45.912230 systemd[1]: Reached target local-fs.target. Feb 12 22:12:45.912384 systemd[1]: Reached target sysinit.target. Feb 12 22:12:45.912536 systemd[1]: Reached target basic.target. Feb 12 22:12:45.913110 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:12:45.923927 systemd-fsck[769]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 22:12:45.925288 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:12:45.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.925944 systemd[1]: Mounting sysroot.mount... Feb 12 22:12:45.933289 systemd[1]: Mounted sysroot.mount. Feb 12 22:12:45.933510 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:12:45.933815 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:12:45.934409 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:12:45.934920 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 22:12:45.934940 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:12:45.934953 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:12:45.936039 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:12:45.936599 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:12:45.939326 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:12:45.942380 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:12:45.944457 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:12:45.946412 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:12:45.971954 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:12:45.972411 systemd[1]: Starting ignition-mount.service... Feb 12 22:12:45.972856 systemd[1]: Starting sysroot-boot.service... Feb 12 22:12:45.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.976217 bash[820]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 22:12:45.981425 ignition[821]: INFO : Ignition 2.14.0 Feb 12 22:12:45.981638 ignition[821]: INFO : Stage: mount Feb 12 22:12:45.981926 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:12:45.982073 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:12:45.983632 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:12:45.985302 ignition[821]: INFO : mount: mount passed Feb 12 22:12:45.985416 ignition[821]: INFO : Ignition finished successfully Feb 12 22:12:45.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:45.985896 systemd[1]: Finished ignition-mount.service. Feb 12 22:12:45.993301 systemd[1]: Finished sysroot-boot.service. Feb 12 22:12:45.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:46.638188 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:12:46.646815 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (830) Feb 12 22:12:46.649096 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:12:46.649112 kernel: BTRFS info (device sda6): using free space tree Feb 12 22:12:46.649121 kernel: BTRFS info (device sda6): has skinny extents Feb 12 22:12:46.652807 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 22:12:46.654346 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:12:46.655188 systemd[1]: Starting ignition-files.service... Feb 12 22:12:46.664192 ignition[850]: INFO : Ignition 2.14.0 Feb 12 22:12:46.664192 ignition[850]: INFO : Stage: files Feb 12 22:12:46.664498 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:12:46.664498 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:12:46.665485 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:12:46.667466 ignition[850]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:12:46.667964 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:12:46.667964 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:12:46.670465 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:12:46.670676 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:12:46.671596 unknown[850]: wrote ssh authorized keys file for user: core Feb 12 22:12:46.672019 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:12:46.672185 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:12:46.672362 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 22:12:46.825825 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 22:12:46.886462 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:12:46.886722 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:12:46.886722 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 22:12:47.386701 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 22:12:47.475121 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 22:12:47.475471 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:12:47.475689 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:12:47.475920 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:12:47.555022 systemd-networkd[735]: ens192: Gained IPv6LL Feb 12 22:12:47.912530 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 22:12:47.974726 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 22:12:47.975036 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:12:47.975211 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:12:47.975211 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:12:48.050980 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 22:12:48.253334 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 22:12:48.253667 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:12:48.253667 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:12:48.253667 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:12:48.302010 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 22:12:48.780431 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 22:12:48.780752 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:12:48.780752 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:12:48.780752 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 22:12:48.833035 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 22:12:49.016990 ignition[850]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 22:12:49.017445 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:12:49.017636 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:12:49.017898 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:12:49.018091 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:12:49.018375 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:12:49.018563 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:12:49.018786 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:12:49.018975 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:12:49.019194 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:12:49.019379 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:12:49.019596 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:12:49.026032 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:12:49.026253 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:12:49.032917 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 12 22:12:49.033211 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:12:49.048344 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4270730822" Feb 12 22:12:49.050571 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (853) Feb 12 22:12:49.050589 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4270730822": device or resource busy Feb 12 22:12:49.050589 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4270730822", trying btrfs: device or resource busy Feb 12 22:12:49.050589 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4270730822" Feb 12 22:12:49.051367 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4270730822" Feb 12 22:12:49.060169 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem4270730822" Feb 12 22:12:49.060864 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem4270730822" Feb 12 22:12:49.060994 systemd[1]: mnt-oem4270730822.mount: Deactivated successfully. Feb 12 22:12:49.061357 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Feb 12 22:12:49.065240 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 12 22:12:49.065564 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Feb 12 22:12:49.065845 ignition[850]: INFO : files: op(14): [started] processing unit "vmtoolsd.service" Feb 12 22:12:49.066038 ignition[850]: INFO : files: op(14): [finished] processing unit "vmtoolsd.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(1b): [started] processing unit "coreos-metadata.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(1b): op(1c): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(1b): op(1c): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(1b): [finished] processing unit "coreos-metadata.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:12:49.066721 ignition[850]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:12:49.070577 ignition[850]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:12:49.070577 ignition[850]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:12:49.070577 ignition[850]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 12 22:12:49.070577 ignition[850]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 22:12:49.070577 ignition[850]: INFO : files: op(20): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 22:12:49.070577 ignition[850]: INFO : files: op(20): op(21): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 22:12:49.261388 ignition[850]: INFO : files: op(20): op(21): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 22:12:49.261388 ignition[850]: INFO : files: op(20): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 22:12:49.261388 ignition[850]: INFO : files: op(22): [started] setting preset to enabled for "vmtoolsd.service" Feb 12 22:12:49.261388 ignition[850]: INFO : files: op(22): [finished] setting preset to enabled for "vmtoolsd.service" Feb 12 22:12:49.261388 ignition[850]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:12:49.261388 ignition[850]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:12:49.261388 ignition[850]: INFO : files: files passed Feb 12 22:12:49.261388 ignition[850]: INFO : Ignition finished successfully Feb 12 22:12:49.262636 systemd[1]: Finished ignition-files.service. Feb 12 22:12:49.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.263330 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:12:49.267076 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 12 22:12:49.267090 kernel: audit: type=1130 audit(1707775969.261:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.263435 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:12:49.263914 systemd[1]: Starting ignition-quench.service... Feb 12 22:12:49.269508 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:12:49.269558 systemd[1]: Finished ignition-quench.service. Feb 12 22:12:49.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.275082 kernel: audit: type=1130 audit(1707775969.268:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.275099 kernel: audit: type=1131 audit(1707775969.268:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.275127 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:12:49.277854 kernel: audit: type=1130 audit(1707775969.273:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.275161 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:12:49.275312 systemd[1]: Reached target ignition-complete.target. Feb 12 22:12:49.278281 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:12:49.287819 kernel: audit: type=1130 audit(1707775969.284:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.287853 kernel: audit: type=1131 audit(1707775969.284:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.286466 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:12:49.286515 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:12:49.286685 systemd[1]: Reached target initrd-fs.target. Feb 12 22:12:49.291637 systemd[1]: Reached target initrd.target. Feb 12 22:12:49.291859 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:12:49.292270 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:12:49.299908 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:12:49.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.300412 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:12:49.303259 kernel: audit: type=1130 audit(1707775969.298:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.307298 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:12:49.307349 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:12:49.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.307903 systemd[1]: Stopped target network.target. Feb 12 22:12:49.312565 kernel: audit: type=1130 audit(1707775969.305:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.312579 kernel: audit: type=1131 audit(1707775969.305:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.312692 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:12:49.312909 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:12:49.313126 systemd[1]: Stopped target timers.target. Feb 12 22:12:49.313342 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:12:49.313492 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:12:49.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.313768 systemd[1]: Stopped target initrd.target. Feb 12 22:12:49.316224 systemd[1]: Stopped target basic.target. Feb 12 22:12:49.316421 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:12:49.316629 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:12:49.316840 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:12:49.316957 kernel: audit: type=1131 audit(1707775969.311:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.317065 systemd[1]: Stopped target remote-fs.target. Feb 12 22:12:49.317260 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:12:49.317465 systemd[1]: Stopped target sysinit.target. Feb 12 22:12:49.317663 systemd[1]: Stopped target local-fs.target. Feb 12 22:12:49.317865 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:12:49.318064 systemd[1]: Stopped target swap.target. Feb 12 22:12:49.318258 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:12:49.318409 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:12:49.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.318669 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:12:49.318877 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:12:49.319029 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:12:49.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.319294 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:12:49.319450 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:12:49.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.319727 systemd[1]: Stopped target paths.target. Feb 12 22:12:49.319931 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:12:49.323839 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:12:49.324070 systemd[1]: Stopped target slices.target. Feb 12 22:12:49.324269 systemd[1]: Stopped target sockets.target. Feb 12 22:12:49.324482 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:12:49.324618 systemd[1]: Closed iscsid.socket. Feb 12 22:12:49.324826 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:12:49.324964 systemd[1]: Closed iscsiuio.socket. Feb 12 22:12:49.325172 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:12:49.325332 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:12:49.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.325614 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:12:49.325761 systemd[1]: Stopped ignition-files.service. Feb 12 22:12:49.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.326409 systemd[1]: Stopping ignition-mount.service... Feb 12 22:12:49.327023 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:12:49.327322 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:12:49.327614 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:12:49.327828 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:12:49.327986 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:12:49.328240 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:12:49.328419 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:12:49.331088 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:12:49.331295 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:12:49.331897 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:12:49.332204 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:12:49.332671 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:12:49.332823 ignition[889]: INFO : Ignition 2.14.0 Feb 12 22:12:49.332823 ignition[889]: INFO : Stage: umount Feb 12 22:12:49.332823 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:12:49.332823 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Feb 12 22:12:49.333511 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:12:49.334105 systemd[1]: Stopping network-cleanup.service... Feb 12 22:12:49.334322 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:12:49.334485 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:12:49.334765 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Feb 12 22:12:49.335007 systemd[1]: Stopped afterburn-network-kargs.service. Feb 12 22:12:49.335263 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:12:49.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.331000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:12:49.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.333000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:12:49.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.335539 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:12:49.335872 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:12:49.336001 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Feb 12 22:12:49.336158 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:12:49.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.337367 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 22:12:49.339613 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 22:12:49.341500 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:12:49.341634 ignition[889]: INFO : umount: umount passed Feb 12 22:12:49.341634 ignition[889]: INFO : Ignition finished successfully Feb 12 22:12:49.342380 systemd[1]: Stopped network-cleanup.service. Feb 12 22:12:49.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.342753 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:12:49.342939 systemd[1]: Stopped ignition-mount.service. Feb 12 22:12:49.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.343234 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:12:49.343382 systemd[1]: Stopped ignition-disks.service. Feb 12 22:12:49.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.343741 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:12:49.343909 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:12:49.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.344128 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:12:49.344147 systemd[1]: Stopped ignition-setup.service. Feb 12 22:12:49.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.345861 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:12:49.346058 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:12:49.346102 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:12:49.346247 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:12:49.346268 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:12:49.351622 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:12:49.351693 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:12:49.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.352075 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:12:49.352092 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:12:49.352336 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:12:49.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.352352 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:12:49.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.352501 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:12:49.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.352522 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:12:49.352676 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:12:49.352695 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:12:49.352869 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:12:49.352889 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:12:49.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.353391 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:12:49.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.353546 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 22:12:49.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.353573 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 22:12:49.353821 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:12:49.353857 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:12:49.353972 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:12:49.353992 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:12:49.354857 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 22:12:49.358134 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:12:49.358179 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:12:49.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.358421 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:12:49.358920 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:12:49.365385 systemd[1]: Switching root. Feb 12 22:12:49.382175 iscsid[740]: iscsid shutting down. Feb 12 22:12:49.382371 systemd-journald[216]: Journal stopped Feb 12 22:12:51.374763 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Feb 12 22:12:51.374780 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:12:51.374788 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:12:51.374794 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:12:51.374814 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:12:51.374821 kernel: SELinux: policy capability open_perms=1 Feb 12 22:12:51.374827 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:12:51.374832 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:12:51.374843 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:12:51.374849 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:12:51.374854 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:12:51.374859 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:12:51.374866 systemd[1]: Successfully loaded SELinux policy in 39.657ms. Feb 12 22:12:51.374873 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.382ms. Feb 12 22:12:51.374881 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:12:51.374888 systemd[1]: Detected virtualization vmware. Feb 12 22:12:51.374895 systemd[1]: Detected architecture x86-64. Feb 12 22:12:51.374901 systemd[1]: Detected first boot. Feb 12 22:12:51.374907 systemd[1]: Initializing machine ID from random generator. Feb 12 22:12:51.374914 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:12:51.374920 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:12:51.374926 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:12:51.374933 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:12:51.374940 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:12:51.374947 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:12:51.374953 systemd[1]: Stopped iscsiuio.service. Feb 12 22:12:51.374960 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:12:51.374973 systemd[1]: Stopped iscsid.service. Feb 12 22:12:51.374988 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:12:51.374995 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:12:51.375001 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:12:51.375009 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:12:51.375015 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:12:51.375022 systemd[1]: Created slice system-getty.slice. Feb 12 22:12:51.375028 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:12:51.375034 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:12:51.375040 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:12:51.375047 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:12:51.375053 systemd[1]: Created slice user.slice. Feb 12 22:12:51.375060 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:12:51.375068 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:12:51.375075 systemd[1]: Set up automount boot.automount. Feb 12 22:12:51.375082 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:12:51.375089 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:12:51.375095 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:12:51.375102 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:12:51.375108 systemd[1]: Reached target integritysetup.target. Feb 12 22:12:51.375115 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:12:51.375122 systemd[1]: Reached target remote-fs.target. Feb 12 22:12:51.375130 systemd[1]: Reached target slices.target. Feb 12 22:12:51.375137 systemd[1]: Reached target swap.target. Feb 12 22:12:51.375143 systemd[1]: Reached target torcx.target. Feb 12 22:12:51.375150 systemd[1]: Reached target veritysetup.target. Feb 12 22:12:51.375156 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:12:51.375164 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:12:51.375171 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:12:51.375178 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:12:51.375185 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:12:51.375191 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:12:51.375198 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:12:51.375205 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:12:51.375212 systemd[1]: Mounting media.mount... Feb 12 22:12:51.375219 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:12:51.375226 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:12:51.375233 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:12:51.375239 systemd[1]: Mounting tmp.mount... Feb 12 22:12:51.375246 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:12:51.375252 systemd[1]: Starting ignition-delete-config.service... Feb 12 22:12:51.375259 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:12:51.375265 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:12:51.375274 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:12:51.375281 systemd[1]: Starting modprobe@drm.service... Feb 12 22:12:51.375287 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:12:51.375294 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:12:51.375301 systemd[1]: Starting modprobe@loop.service... Feb 12 22:12:51.375307 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:12:51.375314 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:12:51.375321 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:12:51.375327 kernel: fuse: init (API version 7.34) Feb 12 22:12:51.375335 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:12:51.375341 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:12:51.375348 systemd[1]: Stopped systemd-journald.service. Feb 12 22:12:51.375355 systemd[1]: Starting systemd-journald.service... Feb 12 22:12:51.375361 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:12:51.375368 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:12:51.375375 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:12:51.375381 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:12:51.375388 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:12:51.375395 systemd[1]: Stopped verity-setup.service. Feb 12 22:12:51.375403 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:12:51.375409 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:12:51.375417 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:12:51.375424 systemd[1]: Mounted media.mount. Feb 12 22:12:51.375431 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:12:51.375437 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:12:51.375444 systemd[1]: Mounted tmp.mount. Feb 12 22:12:51.375451 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:12:51.375459 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:12:51.375465 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:12:51.375472 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:12:51.375479 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:12:51.375485 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:12:51.375492 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:12:51.375499 systemd[1]: Finished modprobe@drm.service. Feb 12 22:12:51.375505 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:12:51.375512 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:12:51.375520 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:12:51.375528 systemd-journald[1014]: Journal started Feb 12 22:12:51.375554 systemd-journald[1014]: Runtime Journal (/run/log/journal/e3b834674ddf49b8856a3ff7c0bfb1ad) is 4.8M, max 38.8M, 34.0M free. Feb 12 22:12:49.481000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:12:49.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:12:49.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:12:49.521000 audit: BPF prog-id=10 op=LOAD Feb 12 22:12:49.521000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:12:49.521000 audit: BPF prog-id=11 op=LOAD Feb 12 22:12:49.521000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:12:49.600000 audit[923]: AVC avc: denied { associate } for pid=923 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:12:49.600000 audit[923]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=906 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:12:49.600000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:12:49.601000 audit[923]: AVC avc: denied { associate } for pid=923 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:12:49.601000 audit[923]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=906 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:12:49.601000 audit: CWD cwd="/" Feb 12 22:12:49.601000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:49.601000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:49.601000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:12:51.261000 audit: BPF prog-id=12 op=LOAD Feb 12 22:12:51.261000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:12:51.261000 audit: BPF prog-id=13 op=LOAD Feb 12 22:12:51.261000 audit: BPF prog-id=14 op=LOAD Feb 12 22:12:51.261000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:12:51.261000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:12:51.262000 audit: BPF prog-id=15 op=LOAD Feb 12 22:12:51.262000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:12:51.262000 audit: BPF prog-id=16 op=LOAD Feb 12 22:12:51.262000 audit: BPF prog-id=17 op=LOAD Feb 12 22:12:51.262000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:12:51.262000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:12:51.263000 audit: BPF prog-id=18 op=LOAD Feb 12 22:12:51.263000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:12:51.264000 audit: BPF prog-id=19 op=LOAD Feb 12 22:12:51.264000 audit: BPF prog-id=20 op=LOAD Feb 12 22:12:51.264000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:12:51.264000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:12:51.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.377239 kernel: loop: module loaded Feb 12 22:12:51.377253 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:12:51.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.274000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:12:51.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.336000 audit: BPF prog-id=21 op=LOAD Feb 12 22:12:51.336000 audit: BPF prog-id=22 op=LOAD Feb 12 22:12:51.337000 audit: BPF prog-id=23 op=LOAD Feb 12 22:12:51.337000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:12:51.337000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:12:51.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.371000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:12:51.371000 audit[1014]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffda9cb7ac0 a2=4000 a3=7ffda9cb7b5c items=0 ppid=1 pid=1014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:12:51.371000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:12:51.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.262271 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:12:49.599411 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:12:51.266224 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:12:49.599880 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:12:51.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:49.599891 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:12:49.599911 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:12:49.599916 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:12:49.599934 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:12:49.599941 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:12:49.600056 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:12:51.378367 jq[989]: true Feb 12 22:12:49.600078 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:12:49.600085 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:12:49.600705 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:12:49.600724 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:12:49.600734 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:12:49.600742 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:12:49.600750 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:12:49.600757 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:12:51.378808 systemd[1]: Started systemd-journald.service. Feb 12 22:12:51.055366 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:12:51.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.055543 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:12:51.055636 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:12:51.056016 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:12:51.379031 jq[1035]: true Feb 12 22:12:51.056059 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:12:51.056112 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-02-12T22:12:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:12:51.379220 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:12:51.379297 systemd[1]: Finished modprobe@loop.service. Feb 12 22:12:51.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.379518 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:12:51.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.379742 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:12:51.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.381108 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:12:51.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.382020 systemd[1]: Reached target network-pre.target. Feb 12 22:12:51.382755 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:12:51.383483 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:12:51.385040 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:12:51.387044 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:12:51.387814 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:12:51.387931 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:12:51.390864 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:12:51.390978 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:12:51.391593 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:12:51.392520 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:12:51.393262 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:12:51.393397 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:12:51.399287 systemd-journald[1014]: Time spent on flushing to /var/log/journal/e3b834674ddf49b8856a3ff7c0bfb1ad is 55.339ms for 2051 entries. Feb 12 22:12:51.399287 systemd-journald[1014]: System Journal (/var/log/journal/e3b834674ddf49b8856a3ff7c0bfb1ad) is 8.0M, max 584.8M, 576.8M free. Feb 12 22:12:51.513932 systemd-journald[1014]: Received client request to flush runtime journal. Feb 12 22:12:51.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.401263 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:12:51.401401 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:12:51.410936 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:12:51.514762 udevadm[1054]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 22:12:51.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.435113 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:12:51.436038 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:12:51.476010 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:12:51.476937 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:12:51.514721 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:12:51.518455 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:12:51.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.543103 ignition[1036]: Ignition 2.14.0 Feb 12 22:12:51.543332 ignition[1036]: deleting config from guestinfo properties Feb 12 22:12:51.546314 ignition[1036]: Successfully deleted config Feb 12 22:12:51.546780 systemd[1]: Finished ignition-delete-config.service. Feb 12 22:12:51.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.817373 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:12:51.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.816000 audit: BPF prog-id=24 op=LOAD Feb 12 22:12:51.816000 audit: BPF prog-id=25 op=LOAD Feb 12 22:12:51.816000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:12:51.816000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:12:51.818669 systemd[1]: Starting systemd-udevd.service... Feb 12 22:12:51.832725 systemd-udevd[1055]: Using default interface naming scheme 'v252'. Feb 12 22:12:51.852394 systemd[1]: Started systemd-udevd.service. Feb 12 22:12:51.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.851000 audit: BPF prog-id=26 op=LOAD Feb 12 22:12:51.853432 systemd[1]: Starting systemd-networkd.service... Feb 12 22:12:51.859000 audit: BPF prog-id=27 op=LOAD Feb 12 22:12:51.859000 audit: BPF prog-id=28 op=LOAD Feb 12 22:12:51.859000 audit: BPF prog-id=29 op=LOAD Feb 12 22:12:51.861749 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:12:51.877399 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 22:12:51.892967 systemd[1]: Started systemd-userdbd.service. Feb 12 22:12:51.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.910812 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 22:12:51.914809 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:12:51.944807 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1071) Feb 12 22:12:51.950810 systemd-networkd[1062]: lo: Link UP Feb 12 22:12:51.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:51.950814 systemd-networkd[1062]: lo: Gained carrier Feb 12 22:12:51.951051 systemd-networkd[1062]: Enumeration completed Feb 12 22:12:51.951103 systemd[1]: Started systemd-networkd.service. Feb 12 22:12:51.951109 systemd-networkd[1062]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Feb 12 22:12:51.954089 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Feb 12 22:12:51.954203 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Feb 12 22:12:51.955288 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Feb 12 22:12:51.955563 systemd-networkd[1062]: ens192: Link UP Feb 12 22:12:51.955689 systemd-networkd[1062]: ens192: Gained carrier Feb 12 22:12:51.963626 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:12:51.986000 audit[1057]: AVC avc: denied { confidentiality } for pid=1057 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:12:51.986000 audit[1057]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c84e1953e0 a1=32194 a2=7fc38a6c9bc5 a3=5 items=108 ppid=1055 pid=1057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:12:51.986000 audit: CWD cwd="/" Feb 12 22:12:51.986000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=1 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=2 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=3 name=(null) inode=18223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=4 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=5 name=(null) inode=18224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=6 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=7 name=(null) inode=18225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=8 name=(null) inode=18225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=9 name=(null) inode=18226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=10 name=(null) inode=18225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=11 name=(null) inode=18227 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=12 name=(null) inode=18225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=13 name=(null) inode=18228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=14 name=(null) inode=18225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=15 name=(null) inode=18229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=16 name=(null) inode=18225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=17 name=(null) inode=18230 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=18 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=19 name=(null) inode=18231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=20 name=(null) inode=18231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=21 name=(null) inode=18232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=22 name=(null) inode=18231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=23 name=(null) inode=18233 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=24 name=(null) inode=18231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=25 name=(null) inode=18234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=26 name=(null) inode=18231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=27 name=(null) inode=18235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=28 name=(null) inode=18231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=29 name=(null) inode=18236 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=30 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=31 name=(null) inode=18237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=32 name=(null) inode=18237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=33 name=(null) inode=18238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=34 name=(null) inode=18237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=35 name=(null) inode=18239 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=36 name=(null) inode=18237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=37 name=(null) inode=18240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=38 name=(null) inode=18237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=39 name=(null) inode=18241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=40 name=(null) inode=18237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=41 name=(null) inode=18242 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=42 name=(null) inode=18222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=43 name=(null) inode=18243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=44 name=(null) inode=18243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=45 name=(null) inode=18244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=46 name=(null) inode=18243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=47 name=(null) inode=18245 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=48 name=(null) inode=18243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=49 name=(null) inode=18246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=50 name=(null) inode=18243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=51 name=(null) inode=18247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=52 name=(null) inode=18243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=53 name=(null) inode=18248 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=55 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=56 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=57 name=(null) inode=18250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=58 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=59 name=(null) inode=18251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=60 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=61 name=(null) inode=18252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=62 name=(null) inode=18252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=63 name=(null) inode=18253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=64 name=(null) inode=18252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=65 name=(null) inode=18254 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=66 name=(null) inode=18252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=67 name=(null) inode=18255 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=68 name=(null) inode=18252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=69 name=(null) inode=18256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=70 name=(null) inode=18252 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=71 name=(null) inode=18257 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=72 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=73 name=(null) inode=18258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=74 name=(null) inode=18258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=75 name=(null) inode=18259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=76 name=(null) inode=18258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=77 name=(null) inode=18260 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=78 name=(null) inode=18258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=79 name=(null) inode=18261 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.994823 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Feb 12 22:12:51.994931 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Feb 12 22:12:51.986000 audit: PATH item=80 name=(null) inode=18258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=81 name=(null) inode=18262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=82 name=(null) inode=18258 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=83 name=(null) inode=18263 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=84 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=85 name=(null) inode=18264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=86 name=(null) inode=18264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=87 name=(null) inode=18265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=88 name=(null) inode=18264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=89 name=(null) inode=18266 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=90 name=(null) inode=18264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=91 name=(null) inode=18267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=92 name=(null) inode=18264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=93 name=(null) inode=18268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=94 name=(null) inode=18264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=95 name=(null) inode=18269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=96 name=(null) inode=18249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=97 name=(null) inode=18270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=98 name=(null) inode=18270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=99 name=(null) inode=18271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=100 name=(null) inode=18270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=101 name=(null) inode=18272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=102 name=(null) inode=18270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=103 name=(null) inode=18273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=104 name=(null) inode=18270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=105 name=(null) inode=18274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=106 name=(null) inode=18270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PATH item=107 name=(null) inode=18275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:12:51.986000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:12:51.995823 kernel: Guest personality initialized and is active Feb 12 22:12:51.999875 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Feb 12 22:12:51.999972 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Feb 12 22:12:52.000002 kernel: Initialized host personality Feb 12 22:12:52.006806 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 22:12:52.024832 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:12:52.028188 (udev-worker)[1066]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Feb 12 22:12:52.040048 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:12:52.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.041187 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:12:52.059805 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:12:52.084338 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:12:52.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.084494 systemd[1]: Reached target cryptsetup.target. Feb 12 22:12:52.085329 systemd[1]: Starting lvm2-activation.service... Feb 12 22:12:52.087402 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:12:52.104301 systemd[1]: Finished lvm2-activation.service. Feb 12 22:12:52.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.104498 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:12:52.104626 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:12:52.104648 systemd[1]: Reached target local-fs.target. Feb 12 22:12:52.104768 systemd[1]: Reached target machines.target. Feb 12 22:12:52.105867 systemd[1]: Starting ldconfig.service... Feb 12 22:12:52.106412 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:12:52.106455 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:12:52.107369 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:12:52.108274 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:12:52.109260 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:12:52.109468 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:12:52.109513 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:12:52.110717 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:12:52.119976 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) Feb 12 22:12:52.120777 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:12:52.125939 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:12:52.131572 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:12:52.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.134284 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:12:52.136821 systemd-tmpfiles[1094]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:12:52.686744 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:12:52.687551 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:12:52.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.705328 systemd-fsck[1099]: fsck.fat 4.2 (2021-01-31) Feb 12 22:12:52.705328 systemd-fsck[1099]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 22:12:52.706932 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:12:52.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.707907 systemd[1]: Mounting boot.mount... Feb 12 22:12:52.717679 systemd[1]: Mounted boot.mount. Feb 12 22:12:52.726729 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:12:52.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.766540 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:12:52.767488 systemd[1]: Starting audit-rules.service... Feb 12 22:12:52.768249 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:12:52.768988 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:12:52.767000 audit: BPF prog-id=30 op=LOAD Feb 12 22:12:52.770394 systemd[1]: Starting systemd-resolved.service... Feb 12 22:12:52.769000 audit: BPF prog-id=31 op=LOAD Feb 12 22:12:52.773074 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:12:52.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.773933 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:12:52.774950 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:12:52.775097 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:12:52.780000 audit[1108]: SYSTEM_BOOT pid=1108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.783574 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:12:52.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.805037 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:12:52.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:12:52.817000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:12:52.817000 audit[1122]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd57a75370 a2=420 a3=0 items=0 ppid=1102 pid=1122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:12:52.817000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:12:52.820160 augenrules[1122]: No rules Feb 12 22:12:52.820233 systemd[1]: Finished audit-rules.service. Feb 12 22:12:52.820658 systemd-resolved[1105]: Positive Trust Anchors: Feb 12 22:12:52.820871 systemd-resolved[1105]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:12:52.820945 systemd-resolved[1105]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:12:52.829186 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:12:52.829309 systemd[1]: Reached target time-set.target. Feb 12 22:12:52.842703 systemd-resolved[1105]: Defaulting to hostname 'linux'. Feb 12 22:12:52.843702 systemd[1]: Started systemd-resolved.service. Feb 12 22:12:52.843834 systemd[1]: Reached target network.target. Feb 12 22:12:52.843921 systemd[1]: Reached target nss-lookup.target. Feb 12 22:12:52.954022 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:13:37.735652 systemd-resolved[1105]: Clock change detected. Flushing caches. Feb 12 22:13:37.735716 systemd-timesyncd[1106]: Contacted time server 99.119.214.210:123 (0.flatcar.pool.ntp.org). Feb 12 22:13:37.735784 systemd-timesyncd[1106]: Initial clock synchronization to Mon 2024-02-12 22:13:37.735591 UTC. Feb 12 22:13:37.746504 systemd[1]: Finished ldconfig.service. Feb 12 22:13:37.747551 systemd[1]: Starting systemd-update-done.service... Feb 12 22:13:37.751519 systemd[1]: Finished systemd-update-done.service. Feb 12 22:13:37.751669 systemd[1]: Reached target sysinit.target. Feb 12 22:13:37.751807 systemd[1]: Started motdgen.path. Feb 12 22:13:37.751960 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:13:37.752142 systemd[1]: Started logrotate.timer. Feb 12 22:13:37.752286 systemd[1]: Started mdadm.timer. Feb 12 22:13:37.752372 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:13:37.752466 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:13:37.752481 systemd[1]: Reached target paths.target. Feb 12 22:13:37.752569 systemd[1]: Reached target timers.target. Feb 12 22:13:37.752799 systemd[1]: Listening on dbus.socket. Feb 12 22:13:37.753554 systemd[1]: Starting docker.socket... Feb 12 22:13:37.755577 systemd[1]: Listening on sshd.socket. Feb 12 22:13:37.755738 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:13:37.755988 systemd[1]: Listening on docker.socket. Feb 12 22:13:37.756119 systemd[1]: Reached target sockets.target. Feb 12 22:13:37.756211 systemd[1]: Reached target basic.target. Feb 12 22:13:37.756326 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:13:37.756340 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:13:37.757009 systemd[1]: Starting containerd.service... Feb 12 22:13:37.758141 systemd[1]: Starting dbus.service... Feb 12 22:13:37.759003 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:13:37.760091 systemd[1]: Starting extend-filesystems.service... Feb 12 22:13:37.760713 jq[1133]: false Feb 12 22:13:37.760894 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:13:37.761545 systemd[1]: Starting motdgen.service... Feb 12 22:13:37.762243 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:13:37.762930 systemd[1]: Starting prepare-critools.service... Feb 12 22:13:37.763619 systemd[1]: Starting prepare-helm.service... Feb 12 22:13:37.764469 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:13:37.765220 systemd[1]: Starting sshd-keygen.service... Feb 12 22:13:37.766620 systemd[1]: Starting systemd-logind.service... Feb 12 22:13:37.766930 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:13:37.766960 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 22:13:37.767386 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:13:37.767949 systemd[1]: Starting update-engine.service... Feb 12 22:13:37.768994 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:13:37.770693 systemd[1]: Starting vmtoolsd.service... Feb 12 22:13:37.772986 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:13:37.773089 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:13:37.773784 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:13:37.774948 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:13:37.784408 systemd[1]: Started vmtoolsd.service. Feb 12 22:13:37.793926 jq[1145]: true Feb 12 22:13:37.794013 tar[1150]: linux-amd64/helm Feb 12 22:13:37.794114 tar[1149]: ./ Feb 12 22:13:37.794114 tar[1149]: ./macvlan Feb 12 22:13:37.794261 jq[1158]: true Feb 12 22:13:37.799873 tar[1153]: crictl Feb 12 22:13:37.806025 extend-filesystems[1134]: Found sda Feb 12 22:13:37.809888 extend-filesystems[1134]: Found sda1 Feb 12 22:13:37.810252 extend-filesystems[1134]: Found sda2 Feb 12 22:13:37.810252 extend-filesystems[1134]: Found sda3 Feb 12 22:13:37.810252 extend-filesystems[1134]: Found usr Feb 12 22:13:37.810252 extend-filesystems[1134]: Found sda4 Feb 12 22:13:37.810252 extend-filesystems[1134]: Found sda6 Feb 12 22:13:37.810252 extend-filesystems[1134]: Found sda7 Feb 12 22:13:37.810252 extend-filesystems[1134]: Found sda9 Feb 12 22:13:37.810252 extend-filesystems[1134]: Checking size of /dev/sda9 Feb 12 22:13:37.820310 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:13:37.820410 systemd[1]: Finished motdgen.service. Feb 12 22:13:37.839096 env[1161]: time="2024-02-12T22:13:37.839067679Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:13:37.842081 extend-filesystems[1134]: Old size kept for /dev/sda9 Feb 12 22:13:37.842081 extend-filesystems[1134]: Found sr0 Feb 12 22:13:37.842215 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:13:37.842306 systemd[1]: Finished extend-filesystems.service. Feb 12 22:13:37.857511 bash[1186]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:13:37.857996 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:13:37.860523 dbus-daemon[1132]: [system] SELinux support is enabled Feb 12 22:13:37.861146 systemd[1]: Started dbus.service. Feb 12 22:13:37.862330 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:13:37.862346 systemd[1]: Reached target system-config.target. Feb 12 22:13:37.862453 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:13:37.862462 systemd[1]: Reached target user-config.target. Feb 12 22:13:37.871854 kernel: NET: Registered PF_VSOCK protocol family Feb 12 22:13:37.875658 update_engine[1144]: I0212 22:13:37.875031 1144 main.cc:92] Flatcar Update Engine starting Feb 12 22:13:37.877173 update_engine[1144]: I0212 22:13:37.877102 1144 update_check_scheduler.cc:74] Next update check in 6m21s Feb 12 22:13:37.877161 systemd[1]: Started update-engine.service. Feb 12 22:13:37.878375 systemd[1]: Started locksmithd.service. Feb 12 22:13:37.903541 systemd-logind[1142]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 22:13:37.903555 systemd-logind[1142]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 22:13:37.904106 systemd-logind[1142]: New seat seat0. Feb 12 22:13:37.905205 systemd[1]: Started systemd-logind.service. Feb 12 22:13:37.911467 tar[1149]: ./static Feb 12 22:13:37.914975 env[1161]: time="2024-02-12T22:13:37.914948182Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:13:37.915047 env[1161]: time="2024-02-12T22:13:37.915032820Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923062 env[1161]: time="2024-02-12T22:13:37.922999493Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923062 env[1161]: time="2024-02-12T22:13:37.923021562Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923164 env[1161]: time="2024-02-12T22:13:37.923148344Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923164 env[1161]: time="2024-02-12T22:13:37.923162094Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923213 env[1161]: time="2024-02-12T22:13:37.923170058Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:13:37.923213 env[1161]: time="2024-02-12T22:13:37.923175582Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923249 env[1161]: time="2024-02-12T22:13:37.923224228Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923371 env[1161]: time="2024-02-12T22:13:37.923357957Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923499 env[1161]: time="2024-02-12T22:13:37.923483081Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:13:37.923499 env[1161]: time="2024-02-12T22:13:37.923496265Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:13:37.923546 env[1161]: time="2024-02-12T22:13:37.923525370Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:13:37.923546 env[1161]: time="2024-02-12T22:13:37.923532355Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:13:37.927409 env[1161]: time="2024-02-12T22:13:37.927388771Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:13:37.927451 env[1161]: time="2024-02-12T22:13:37.927409292Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:13:37.927451 env[1161]: time="2024-02-12T22:13:37.927422126Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:13:37.927451 env[1161]: time="2024-02-12T22:13:37.927445248Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927455085Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927463129Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927470082Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927477915Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927485030Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927491882Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927534 env[1161]: time="2024-02-12T22:13:37.927524967Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927666 env[1161]: time="2024-02-12T22:13:37.927535354Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:13:37.927666 env[1161]: time="2024-02-12T22:13:37.927584395Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:13:37.927666 env[1161]: time="2024-02-12T22:13:37.927633320Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:13:37.927853 env[1161]: time="2024-02-12T22:13:37.927838743Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:13:37.927885 env[1161]: time="2024-02-12T22:13:37.927863560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.927885 env[1161]: time="2024-02-12T22:13:37.927875753Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:13:37.927932 env[1161]: time="2024-02-12T22:13:37.927918132Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.927959 env[1161]: time="2024-02-12T22:13:37.927935072Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.927959 env[1161]: time="2024-02-12T22:13:37.927948750Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.927959 env[1161]: time="2024-02-12T22:13:37.927956116Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928009 env[1161]: time="2024-02-12T22:13:37.927992581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928009 env[1161]: time="2024-02-12T22:13:37.928001155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928009 env[1161]: time="2024-02-12T22:13:37.928008284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928053 env[1161]: time="2024-02-12T22:13:37.928014317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928053 env[1161]: time="2024-02-12T22:13:37.928022039Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:13:37.928103 env[1161]: time="2024-02-12T22:13:37.928086596Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928103 env[1161]: time="2024-02-12T22:13:37.928095708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928103 env[1161]: time="2024-02-12T22:13:37.928102590Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928156 env[1161]: time="2024-02-12T22:13:37.928108993Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:13:37.928156 env[1161]: time="2024-02-12T22:13:37.928116516Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:13:37.928156 env[1161]: time="2024-02-12T22:13:37.928123021Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:13:37.928156 env[1161]: time="2024-02-12T22:13:37.928135448Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:13:37.928232 env[1161]: time="2024-02-12T22:13:37.928156878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:13:37.928301 env[1161]: time="2024-02-12T22:13:37.928268312Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:13:37.930179 env[1161]: time="2024-02-12T22:13:37.928302143Z" level=info msg="Connect containerd service" Feb 12 22:13:37.930179 env[1161]: time="2024-02-12T22:13:37.928318737Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:13:37.930179 env[1161]: time="2024-02-12T22:13:37.928676854Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:13:37.930179 env[1161]: time="2024-02-12T22:13:37.928819558Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:13:37.930179 env[1161]: time="2024-02-12T22:13:37.929301638Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:13:37.929364 systemd[1]: Started containerd.service. Feb 12 22:13:37.930330 env[1161]: time="2024-02-12T22:13:37.930183538Z" level=info msg="containerd successfully booted in 0.094998s" Feb 12 22:13:37.931808 env[1161]: time="2024-02-12T22:13:37.931784598Z" level=info msg="Start subscribing containerd event" Feb 12 22:13:37.931863 env[1161]: time="2024-02-12T22:13:37.931813604Z" level=info msg="Start recovering state" Feb 12 22:13:37.931863 env[1161]: time="2024-02-12T22:13:37.931851595Z" level=info msg="Start event monitor" Feb 12 22:13:37.931900 env[1161]: time="2024-02-12T22:13:37.931862801Z" level=info msg="Start snapshots syncer" Feb 12 22:13:37.931900 env[1161]: time="2024-02-12T22:13:37.931868148Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:13:37.931900 env[1161]: time="2024-02-12T22:13:37.931872938Z" level=info msg="Start streaming server" Feb 12 22:13:37.985489 tar[1149]: ./vlan Feb 12 22:13:38.053052 tar[1149]: ./portmap Feb 12 22:13:38.114025 tar[1149]: ./host-local Feb 12 22:13:38.169201 tar[1149]: ./vrf Feb 12 22:13:38.224269 tar[1149]: ./bridge Feb 12 22:13:38.279468 tar[1149]: ./tuning Feb 12 22:13:38.318053 tar[1149]: ./firewall Feb 12 22:13:38.367852 tar[1149]: ./host-device Feb 12 22:13:38.413637 tar[1149]: ./sbr Feb 12 22:13:38.414023 systemd-networkd[1062]: ens192: Gained IPv6LL Feb 12 22:13:38.455397 tar[1149]: ./loopback Feb 12 22:13:38.488154 systemd[1]: Finished prepare-critools.service. Feb 12 22:13:38.493576 tar[1149]: ./dhcp Feb 12 22:13:38.525794 tar[1150]: linux-amd64/LICENSE Feb 12 22:13:38.525839 tar[1150]: linux-amd64/README.md Feb 12 22:13:38.531548 systemd[1]: Finished prepare-helm.service. Feb 12 22:13:38.565889 tar[1149]: ./ptp Feb 12 22:13:38.589409 tar[1149]: ./ipvlan Feb 12 22:13:38.612460 tar[1149]: ./bandwidth Feb 12 22:13:38.663806 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:13:38.759854 locksmithd[1198]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:13:38.782568 sshd_keygen[1154]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:13:38.795041 systemd[1]: Finished sshd-keygen.service. Feb 12 22:13:38.796132 systemd[1]: Starting issuegen.service... Feb 12 22:13:38.799073 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:13:38.799148 systemd[1]: Finished issuegen.service. Feb 12 22:13:38.800125 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:13:38.803421 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:13:38.804205 systemd[1]: Started getty@tty1.service. Feb 12 22:13:38.804920 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 22:13:38.805104 systemd[1]: Reached target getty.target. Feb 12 22:13:38.805233 systemd[1]: Reached target multi-user.target. Feb 12 22:13:38.806014 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:13:38.810378 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:13:38.810459 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:13:38.810608 systemd[1]: Startup finished in 851ms (kernel) + 5.890s (initrd) + 4.598s (userspace) = 11.339s. Feb 12 22:13:38.829305 login[1267]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 22:13:38.830812 login[1268]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 22:13:38.837395 systemd[1]: Created slice user-500.slice. Feb 12 22:13:38.838096 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:13:38.841987 systemd-logind[1142]: New session 2 of user core. Feb 12 22:13:38.844367 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:13:38.845180 systemd[1]: Starting user@500.service... Feb 12 22:13:38.847376 (systemd)[1271]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:13:38.889069 systemd[1271]: Queued start job for default target default.target. Feb 12 22:13:38.889766 systemd[1271]: Reached target paths.target. Feb 12 22:13:38.889881 systemd[1271]: Reached target sockets.target. Feb 12 22:13:38.889940 systemd[1271]: Reached target timers.target. Feb 12 22:13:38.889998 systemd[1271]: Reached target basic.target. Feb 12 22:13:38.890073 systemd[1271]: Reached target default.target. Feb 12 22:13:38.890106 systemd[1]: Started user@500.service. Feb 12 22:13:38.890533 systemd[1271]: Startup finished in 40ms. Feb 12 22:13:38.890772 systemd[1]: Started session-2.scope. Feb 12 22:13:39.829622 login[1267]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 22:13:39.832530 systemd-logind[1142]: New session 1 of user core. Feb 12 22:13:39.833388 systemd[1]: Started session-1.scope. Feb 12 22:13:45.636489 systemd[1]: Created slice system-sshd.slice. Feb 12 22:13:45.637345 systemd[1]: Started sshd@0-139.178.70.100:22-101.42.7.118:51794.service. Feb 12 22:13:57.009223 systemd[1]: Started sshd@1-139.178.70.100:22-188.166.160.119:52834.service. Feb 12 22:13:57.936975 sshd[1294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.160.119 user=root Feb 12 22:13:59.707259 sshd[1294]: Failed password for root from 188.166.160.119 port 52834 ssh2 Feb 12 22:14:00.511620 systemd[1]: Started sshd@2-139.178.70.100:22-152.32.209.108:39070.service. Feb 12 22:14:00.685124 systemd[1]: Started sshd@3-139.178.70.100:22-139.155.157.20:42726.service. Feb 12 22:14:01.310215 systemd[1]: Started sshd@4-139.178.70.100:22-51.77.245.237:49010.service. Feb 12 22:14:01.396358 sshd[1297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.209.108 user=root Feb 12 22:14:01.530867 sshd[1294]: Received disconnect from 188.166.160.119 port 52834:11: Bye Bye [preauth] Feb 12 22:14:01.531120 sshd[1294]: Disconnected from authenticating user root 188.166.160.119 port 52834 [preauth] Feb 12 22:14:01.531818 systemd[1]: sshd@1-139.178.70.100:22-188.166.160.119:52834.service: Deactivated successfully. Feb 12 22:14:01.729198 sshd[1300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.157.20 user=root Feb 12 22:14:02.171160 sshd[1303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.237 user=root Feb 12 22:14:03.050866 sshd[1297]: Failed password for root from 152.32.209.108 port 39070 ssh2 Feb 12 22:14:03.262787 sshd[1292]: Connection closed by 101.42.7.118 port 51794 [preauth] Feb 12 22:14:03.263504 systemd[1]: sshd@0-139.178.70.100:22-101.42.7.118:51794.service: Deactivated successfully. Feb 12 22:14:03.266629 sshd[1297]: Received disconnect from 152.32.209.108 port 39070:11: Bye Bye [preauth] Feb 12 22:14:03.266695 sshd[1297]: Disconnected from authenticating user root 152.32.209.108 port 39070 [preauth] Feb 12 22:14:03.267283 systemd[1]: sshd@2-139.178.70.100:22-152.32.209.108:39070.service: Deactivated successfully. Feb 12 22:14:03.384012 sshd[1300]: Failed password for root from 139.155.157.20 port 42726 ssh2 Feb 12 22:14:03.631354 sshd[1300]: Received disconnect from 139.155.157.20 port 42726:11: Bye Bye [preauth] Feb 12 22:14:03.631461 sshd[1300]: Disconnected from authenticating user root 139.155.157.20 port 42726 [preauth] Feb 12 22:14:03.632171 systemd[1]: sshd@3-139.178.70.100:22-139.155.157.20:42726.service: Deactivated successfully. Feb 12 22:14:04.297519 sshd[1303]: Failed password for root from 51.77.245.237 port 49010 ssh2 Feb 12 22:14:05.201305 systemd[1]: Started sshd@5-139.178.70.100:22-213.74.115.162:37044.service. Feb 12 22:14:05.759330 sshd[1303]: Received disconnect from 51.77.245.237 port 49010:11: Bye Bye [preauth] Feb 12 22:14:05.759579 sshd[1303]: Disconnected from authenticating user root 51.77.245.237 port 49010 [preauth] Feb 12 22:14:05.760240 systemd[1]: sshd@4-139.178.70.100:22-51.77.245.237:49010.service: Deactivated successfully. Feb 12 22:14:06.259003 sshd[1311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.115.162 user=root Feb 12 22:14:06.259316 sshd[1311]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 22:14:08.265401 sshd[1311]: Failed password for root from 213.74.115.162 port 37044 ssh2 Feb 12 22:14:09.878821 sshd[1311]: Received disconnect from 213.74.115.162 port 37044:11: Bye Bye [preauth] Feb 12 22:14:09.879096 sshd[1311]: Disconnected from authenticating user root 213.74.115.162 port 37044 [preauth] Feb 12 22:14:09.879766 systemd[1]: sshd@5-139.178.70.100:22-213.74.115.162:37044.service: Deactivated successfully. Feb 12 22:14:11.813675 systemd[1]: Started sshd@6-139.178.70.100:22-130.61.232.86:39358.service. Feb 12 22:14:12.623418 sshd[1316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 user=root Feb 12 22:14:13.168847 systemd[1]: Started sshd@7-139.178.70.100:22-178.128.219.157:42338.service. Feb 12 22:14:13.786506 systemd[1]: Started sshd@8-139.178.70.100:22-124.220.29.33:49064.service. Feb 12 22:14:14.454225 sshd[1316]: Failed password for root from 130.61.232.86 port 39358 ssh2 Feb 12 22:14:14.562673 sshd[1319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.219.157 user=root Feb 12 22:14:15.986666 systemd[1]: Started sshd@9-139.178.70.100:22-14.102.74.99:58462.service. Feb 12 22:14:16.196754 sshd[1316]: Received disconnect from 130.61.232.86 port 39358:11: Bye Bye [preauth] Feb 12 22:14:16.196754 sshd[1316]: Disconnected from authenticating user root 130.61.232.86 port 39358 [preauth] Feb 12 22:14:16.197325 systemd[1]: sshd@6-139.178.70.100:22-130.61.232.86:39358.service: Deactivated successfully. Feb 12 22:14:16.668823 sshd[1319]: Failed password for root from 178.128.219.157 port 42338 ssh2 Feb 12 22:14:17.422891 sshd[1324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99 user=root Feb 12 22:14:17.934151 systemd[1]: Started sshd@10-139.178.70.100:22-139.178.89.65:41916.service. Feb 12 22:14:17.966970 sshd[1328]: Accepted publickey for core from 139.178.89.65 port 41916 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:17.967750 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:17.971321 systemd[1]: Started session-3.scope. Feb 12 22:14:17.971557 systemd-logind[1142]: New session 3 of user core. Feb 12 22:14:18.019735 systemd[1]: Started sshd@11-139.178.70.100:22-139.178.89.65:41924.service. Feb 12 22:14:18.052189 sshd[1333]: Accepted publickey for core from 139.178.89.65 port 41924 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:18.053077 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:18.056377 systemd[1]: Started session-4.scope. Feb 12 22:14:18.056612 systemd-logind[1142]: New session 4 of user core. Feb 12 22:14:18.106593 sshd[1333]: pam_unix(sshd:session): session closed for user core Feb 12 22:14:18.108635 systemd[1]: Started sshd@12-139.178.70.100:22-139.178.89.65:47120.service. Feb 12 22:14:18.111024 systemd-logind[1142]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:14:18.111169 systemd[1]: sshd@11-139.178.70.100:22-139.178.89.65:41924.service: Deactivated successfully. Feb 12 22:14:18.111586 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:14:18.113194 systemd-logind[1142]: Removed session 4. Feb 12 22:14:18.143457 sshd[1338]: Accepted publickey for core from 139.178.89.65 port 47120 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:18.144410 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:18.147763 systemd[1]: Started session-5.scope. Feb 12 22:14:18.148192 systemd-logind[1142]: New session 5 of user core. Feb 12 22:14:18.196532 sshd[1338]: pam_unix(sshd:session): session closed for user core Feb 12 22:14:18.198926 systemd[1]: sshd@12-139.178.70.100:22-139.178.89.65:47120.service: Deactivated successfully. Feb 12 22:14:18.199333 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:14:18.199806 systemd-logind[1142]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:14:18.200495 systemd[1]: Started sshd@13-139.178.70.100:22-139.178.89.65:47130.service. Feb 12 22:14:18.201076 systemd-logind[1142]: Removed session 5. Feb 12 22:14:18.234995 sshd[1345]: Accepted publickey for core from 139.178.89.65 port 47130 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:18.235754 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:18.239253 systemd[1]: Started session-6.scope. Feb 12 22:14:18.239479 systemd-logind[1142]: New session 6 of user core. Feb 12 22:14:18.249859 sshd[1319]: Received disconnect from 178.128.219.157 port 42338:11: Bye Bye [preauth] Feb 12 22:14:18.250044 sshd[1319]: Disconnected from authenticating user root 178.128.219.157 port 42338 [preauth] Feb 12 22:14:18.250608 systemd[1]: sshd@7-139.178.70.100:22-178.128.219.157:42338.service: Deactivated successfully. Feb 12 22:14:18.290657 sshd[1345]: pam_unix(sshd:session): session closed for user core Feb 12 22:14:18.292703 systemd[1]: Started sshd@14-139.178.70.100:22-139.178.89.65:47146.service. Feb 12 22:14:18.293445 systemd[1]: sshd@13-139.178.70.100:22-139.178.89.65:47130.service: Deactivated successfully. Feb 12 22:14:18.293950 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:14:18.294590 systemd-logind[1142]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:14:18.295372 systemd-logind[1142]: Removed session 6. Feb 12 22:14:18.327961 sshd[1351]: Accepted publickey for core from 139.178.89.65 port 47146 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:18.328908 sshd[1351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:18.331760 systemd-logind[1142]: New session 7 of user core. Feb 12 22:14:18.332251 systemd[1]: Started session-7.scope. Feb 12 22:14:18.393227 sudo[1355]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:14:18.393382 sudo[1355]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:14:18.399932 dbus-daemon[1132]: Ѝ\xbc\x9e\xceU: received setenforce notice (enforcing=1786619008) Feb 12 22:14:18.401107 sudo[1355]: pam_unix(sudo:session): session closed for user root Feb 12 22:14:18.405370 systemd[1]: Started sshd@15-139.178.70.100:22-139.178.89.65:47152.service. Feb 12 22:14:18.406214 sshd[1351]: pam_unix(sshd:session): session closed for user core Feb 12 22:14:18.408410 systemd-logind[1142]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:14:18.408624 systemd[1]: sshd@14-139.178.70.100:22-139.178.89.65:47146.service: Deactivated successfully. Feb 12 22:14:18.409075 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:14:18.409932 systemd-logind[1142]: Removed session 7. Feb 12 22:14:18.440808 sshd[1358]: Accepted publickey for core from 139.178.89.65 port 47152 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:18.441791 sshd[1358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:18.445169 systemd[1]: Started session-8.scope. Feb 12 22:14:18.445391 systemd-logind[1142]: New session 8 of user core. Feb 12 22:14:18.495405 sudo[1363]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:14:18.495791 sudo[1363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:14:18.497808 sudo[1363]: pam_unix(sudo:session): session closed for user root Feb 12 22:14:18.501095 sudo[1362]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:14:18.501242 sudo[1362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:14:18.507782 systemd[1]: Stopping audit-rules.service... Feb 12 22:14:18.507000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:14:18.509539 kernel: kauditd_printk_skb: 250 callbacks suppressed Feb 12 22:14:18.509579 kernel: audit: type=1305 audit(1707776058.507:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:14:18.507000 audit[1366]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd12daed30 a2=420 a3=0 items=0 ppid=1 pid=1366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:18.516439 kernel: audit: type=1300 audit(1707776058.507:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd12daed30 a2=420 a3=0 items=0 ppid=1 pid=1366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:18.517796 kernel: audit: type=1327 audit(1707776058.507:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:14:18.507000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:14:18.517879 auditctl[1366]: No rules Feb 12 22:14:18.518103 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:14:18.518227 systemd[1]: Stopped audit-rules.service. Feb 12 22:14:18.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.519401 systemd[1]: Starting audit-rules.service... Feb 12 22:14:18.523846 kernel: audit: type=1131 audit(1707776058.517:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.530340 augenrules[1383]: No rules Feb 12 22:14:18.530688 systemd[1]: Finished audit-rules.service. Feb 12 22:14:18.531315 sudo[1362]: pam_unix(sudo:session): session closed for user root Feb 12 22:14:18.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.534522 sshd[1358]: pam_unix(sshd:session): session closed for user core Feb 12 22:14:18.534859 kernel: audit: type=1130 audit(1707776058.529:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.535941 systemd[1]: Started sshd@16-139.178.70.100:22-139.178.89.65:47154.service. Feb 12 22:14:18.530000 audit[1362]: USER_END pid=1362 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.530000 audit[1362]: CRED_DISP pid=1362 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.541983 kernel: audit: type=1106 audit(1707776058.530:176): pid=1362 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.542014 kernel: audit: type=1104 audit(1707776058.530:177): pid=1362 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.543577 systemd[1]: sshd@15-139.178.70.100:22-139.178.89.65:47152.service: Deactivated successfully. Feb 12 22:14:18.543945 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 22:14:18.544588 systemd-logind[1142]: Session 8 logged out. Waiting for processes to exit. Feb 12 22:14:18.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-139.178.89.65:47154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.547841 kernel: audit: type=1130 audit(1707776058.535:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-139.178.89.65:47154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.548008 systemd-logind[1142]: Removed session 8. Feb 12 22:14:18.542000 audit[1358]: USER_END pid=1358 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.542000 audit[1358]: CRED_DISP pid=1358 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.554504 kernel: audit: type=1106 audit(1707776058.542:179): pid=1358 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.554532 kernel: audit: type=1104 audit(1707776058.542:180): pid=1358 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-139.178.89.65:47152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.567515 sshd[1388]: Accepted publickey for core from 139.178.89.65 port 47154 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:14:18.566000 audit[1388]: USER_ACCT pid=1388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.567000 audit[1388]: CRED_ACQ pid=1388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.567000 audit[1388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62742580 a2=3 a3=0 items=0 ppid=1 pid=1388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:18.567000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:14:18.568700 sshd[1388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:14:18.571438 systemd-logind[1142]: New session 9 of user core. Feb 12 22:14:18.571901 systemd[1]: Started session-9.scope. Feb 12 22:14:18.574000 audit[1388]: USER_START pid=1388 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.574000 audit[1391]: CRED_ACQ pid=1391 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:18.621638 sudo[1392]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:14:18.621794 sudo[1392]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:14:18.620000 audit[1392]: USER_ACCT pid=1392 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.620000 audit[1392]: CRED_REFR pid=1392 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:18.622000 audit[1392]: USER_START pid=1392 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:19.133993 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:14:19.137620 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:14:19.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:19.137857 systemd[1]: Reached target network-online.target. Feb 12 22:14:19.138844 systemd[1]: Starting docker.service... Feb 12 22:14:19.160168 env[1408]: time="2024-02-12T22:14:19.160140134Z" level=info msg="Starting up" Feb 12 22:14:19.160865 env[1408]: time="2024-02-12T22:14:19.160851100Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:14:19.160865 env[1408]: time="2024-02-12T22:14:19.160862324Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:14:19.160927 env[1408]: time="2024-02-12T22:14:19.160873473Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:14:19.160927 env[1408]: time="2024-02-12T22:14:19.160879333Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:14:19.161728 env[1408]: time="2024-02-12T22:14:19.161717194Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:14:19.161776 env[1408]: time="2024-02-12T22:14:19.161766437Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:14:19.161821 env[1408]: time="2024-02-12T22:14:19.161809514Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:14:19.162116 env[1408]: time="2024-02-12T22:14:19.162106288Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:14:19.164862 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3191519206-merged.mount: Deactivated successfully. Feb 12 22:14:19.176782 env[1408]: time="2024-02-12T22:14:19.176771398Z" level=info msg="Loading containers: start." Feb 12 22:14:19.204000 audit[1438]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.204000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdedfa57d0 a2=0 a3=7ffdedfa57bc items=0 ppid=1408 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 22:14:19.205000 audit[1440]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.205000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffee93c0420 a2=0 a3=7ffee93c040c items=0 ppid=1408 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.205000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 22:14:19.206000 audit[1442]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.206000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffed1cc7d50 a2=0 a3=7ffed1cc7d3c items=0 ppid=1408 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:14:19.207000 audit[1444]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.207000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa41e1380 a2=0 a3=7fffa41e136c items=0 ppid=1408 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:14:19.209000 audit[1446]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.209000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd6817e160 a2=0 a3=7ffd6817e14c items=0 ppid=1408 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 22:14:19.221000 audit[1451]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.221000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc89612de0 a2=0 a3=7ffc89612dcc items=0 ppid=1408 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.221000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 22:14:19.225000 audit[1453]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.225000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1a5d7d80 a2=0 a3=7ffe1a5d7d6c items=0 ppid=1408 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 22:14:19.226000 audit[1455]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.226000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff955b7df0 a2=0 a3=7fff955b7ddc items=0 ppid=1408 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 22:14:19.228000 audit[1457]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.228000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffdb577d10 a2=0 a3=7fffdb577cfc items=0 ppid=1408 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.228000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:14:19.231000 audit[1461]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.231000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe0f1a5e70 a2=0 a3=7ffe0f1a5e5c items=0 ppid=1408 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:14:19.232000 audit[1462]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.232000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff05b0a600 a2=0 a3=7fff05b0a5ec items=0 ppid=1408 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.232000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:14:19.238845 kernel: Initializing XFRM netlink socket Feb 12 22:14:19.260268 env[1408]: time="2024-02-12T22:14:19.260251091Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 22:14:19.272898 sshd[1324]: Failed password for root from 14.102.74.99 port 58462 ssh2 Feb 12 22:14:19.274000 audit[1470]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.274000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcdbd986d0 a2=0 a3=7ffcdbd986bc items=0 ppid=1408 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.274000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 22:14:19.282000 audit[1473]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.282000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcf2d743c0 a2=0 a3=7ffcf2d743ac items=0 ppid=1408 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 22:14:19.283000 audit[1476]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.283000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe5dbf6e80 a2=0 a3=7ffe5dbf6e6c items=0 ppid=1408 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 22:14:19.284000 audit[1478]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.284000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd387e8b30 a2=0 a3=7ffd387e8b1c items=0 ppid=1408 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 22:14:19.285000 audit[1480]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.285000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff1f70a650 a2=0 a3=7fff1f70a63c items=0 ppid=1408 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.285000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 22:14:19.286000 audit[1482]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.286000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd1696abc0 a2=0 a3=7ffd1696abac items=0 ppid=1408 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 22:14:19.287000 audit[1484]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.287000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd39f0e790 a2=0 a3=7ffd39f0e77c items=0 ppid=1408 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.287000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 22:14:19.292000 audit[1487]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.292000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe6f891940 a2=0 a3=7ffe6f89192c items=0 ppid=1408 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 22:14:19.293000 audit[1489]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.293000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff313b9880 a2=0 a3=7fff313b986c items=0 ppid=1408 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:14:19.294000 audit[1491]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.294000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcd741d1d0 a2=0 a3=7ffcd741d1bc items=0 ppid=1408 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:14:19.296000 audit[1493]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.296000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff55e5d190 a2=0 a3=7fff55e5d17c items=0 ppid=1408 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 22:14:19.297114 systemd-networkd[1062]: docker0: Link UP Feb 12 22:14:19.300000 audit[1497]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.300000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1d287ff0 a2=0 a3=7fff1d287fdc items=0 ppid=1408 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:14:19.300000 audit[1498]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:19.300000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd79750f0 a2=0 a3=7ffcd79750dc items=0 ppid=1408 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:19.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:14:19.301634 env[1408]: time="2024-02-12T22:14:19.301622650Z" level=info msg="Loading containers: done." Feb 12 22:14:19.306724 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1907798861-merged.mount: Deactivated successfully. Feb 12 22:14:19.311450 env[1408]: time="2024-02-12T22:14:19.311430083Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 22:14:19.311537 env[1408]: time="2024-02-12T22:14:19.311523400Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 22:14:19.311581 env[1408]: time="2024-02-12T22:14:19.311570341Z" level=info msg="Daemon has completed initialization" Feb 12 22:14:19.323094 env[1408]: time="2024-02-12T22:14:19.323075036Z" level=info msg="API listen on /run/docker.sock" Feb 12 22:14:19.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:19.323474 systemd[1]: Started docker.service. Feb 12 22:14:19.335229 systemd[1]: Reloading. Feb 12 22:14:19.387508 /usr/lib/systemd/system-generators/torcx-generator[1548]: time="2024-02-12T22:14:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:14:19.389233 /usr/lib/systemd/system-generators/torcx-generator[1548]: time="2024-02-12T22:14:19Z" level=info msg="torcx already run" Feb 12 22:14:19.439129 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:14:19.439141 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:14:19.451022 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit: BPF prog-id=37 op=LOAD Feb 12 22:14:19.483000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit: BPF prog-id=38 op=LOAD Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit: BPF prog-id=39 op=LOAD Feb 12 22:14:19.483000 audit: BPF prog-id=33 op=UNLOAD Feb 12 22:14:19.483000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit: BPF prog-id=40 op=LOAD Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.484000 audit: BPF prog-id=41 op=LOAD Feb 12 22:14:19.484000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:14:19.484000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit: BPF prog-id=42 op=LOAD Feb 12 22:14:19.485000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit: BPF prog-id=43 op=LOAD Feb 12 22:14:19.485000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit: BPF prog-id=44 op=LOAD Feb 12 22:14:19.486000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.486000 audit: BPF prog-id=45 op=LOAD Feb 12 22:14:19.486000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit: BPF prog-id=46 op=LOAD Feb 12 22:14:19.487000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit: BPF prog-id=47 op=LOAD Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit: BPF prog-id=48 op=LOAD Feb 12 22:14:19.487000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:14:19.487000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit: BPF prog-id=49 op=LOAD Feb 12 22:14:19.487000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit: BPF prog-id=50 op=LOAD Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:19.488000 audit: BPF prog-id=51 op=LOAD Feb 12 22:14:19.488000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:14:19.488000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:14:19.494771 systemd[1]: Started kubelet.service. Feb 12 22:14:19.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:19.521631 kubelet[1607]: E0212 22:14:19.521586 1607 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:14:19.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:14:19.522757 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:14:19.522823 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:14:19.949314 env[1161]: time="2024-02-12T22:14:19.949276610Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 22:14:20.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-101.42.7.118:59012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:20.260525 systemd[1]: Started sshd@17-139.178.70.100:22-101.42.7.118:59012.service. Feb 12 22:14:20.542659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3497762609.mount: Deactivated successfully. Feb 12 22:14:21.118344 sshd[1324]: Received disconnect from 14.102.74.99 port 58462:11: Bye Bye [preauth] Feb 12 22:14:21.118344 sshd[1324]: Disconnected from authenticating user root 14.102.74.99 port 58462 [preauth] Feb 12 22:14:21.119272 systemd[1]: sshd@9-139.178.70.100:22-14.102.74.99:58462.service: Deactivated successfully. Feb 12 22:14:21.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-14.102.74.99:58462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:21.173000 audit[1627]: USER_AUTH pid=1627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:14:21.174696 sshd[1627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:14:21.984227 env[1161]: time="2024-02-12T22:14:21.984192839Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:21.985685 env[1161]: time="2024-02-12T22:14:21.985663368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:21.987240 env[1161]: time="2024-02-12T22:14:21.987220120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:21.988675 env[1161]: time="2024-02-12T22:14:21.988654043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:21.989258 env[1161]: time="2024-02-12T22:14:21.989235262Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 22:14:21.996833 env[1161]: time="2024-02-12T22:14:21.996809054Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 22:14:23.475888 update_engine[1144]: I0212 22:14:23.475855 1144 update_attempter.cc:509] Updating boot flags... Feb 12 22:14:23.575899 sshd[1627]: Failed password for root from 101.42.7.118 port 59012 ssh2 Feb 12 22:14:23.660945 env[1161]: time="2024-02-12T22:14:23.660911114Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:23.661923 env[1161]: time="2024-02-12T22:14:23.661908756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:23.663223 env[1161]: time="2024-02-12T22:14:23.663208357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:23.664321 env[1161]: time="2024-02-12T22:14:23.664305962Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:23.664708 env[1161]: time="2024-02-12T22:14:23.664691060Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 22:14:23.671152 env[1161]: time="2024-02-12T22:14:23.671133625Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 22:14:24.768852 sshd[1627]: Received disconnect from 101.42.7.118 port 59012:11: Bye Bye [preauth] Feb 12 22:14:24.768852 sshd[1627]: Disconnected from authenticating user root 101.42.7.118 port 59012 [preauth] Feb 12 22:14:24.769526 systemd[1]: sshd@17-139.178.70.100:22-101.42.7.118:59012.service: Deactivated successfully. Feb 12 22:14:24.773070 kernel: kauditd_printk_skb: 262 callbacks suppressed Feb 12 22:14:24.773115 kernel: audit: type=1131 audit(1707776064.768:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-101.42.7.118:59012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:24.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-101.42.7.118:59012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:25.036300 env[1161]: time="2024-02-12T22:14:25.036236688Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:25.037581 env[1161]: time="2024-02-12T22:14:25.037565447Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:25.038709 env[1161]: time="2024-02-12T22:14:25.038694517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:25.039847 env[1161]: time="2024-02-12T22:14:25.039819138Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:25.040233 env[1161]: time="2024-02-12T22:14:25.040215288Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 22:14:25.045964 env[1161]: time="2024-02-12T22:14:25.045950407Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 22:14:26.032560 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount979829328.mount: Deactivated successfully. Feb 12 22:14:26.387979 env[1161]: time="2024-02-12T22:14:26.387847576Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.405209 env[1161]: time="2024-02-12T22:14:26.405188302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.412265 env[1161]: time="2024-02-12T22:14:26.412240795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.417615 env[1161]: time="2024-02-12T22:14:26.417588586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.418045 env[1161]: time="2024-02-12T22:14:26.418010214Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 22:14:26.426197 env[1161]: time="2024-02-12T22:14:26.426179095Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 22:14:26.913094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2542121054.mount: Deactivated successfully. Feb 12 22:14:26.913714 env[1161]: time="2024-02-12T22:14:26.913692296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.914636 env[1161]: time="2024-02-12T22:14:26.914623990Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.915633 env[1161]: time="2024-02-12T22:14:26.915622341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.918772 env[1161]: time="2024-02-12T22:14:26.918758403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:26.919031 env[1161]: time="2024-02-12T22:14:26.919011770Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 22:14:26.924389 env[1161]: time="2024-02-12T22:14:26.924372980Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 22:14:27.548821 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3993982204.mount: Deactivated successfully. Feb 12 22:14:29.649628 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 22:14:29.657456 kernel: audit: type=1130 audit(1707776069.648:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:29.657509 kernel: audit: type=1131 audit(1707776069.648:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:29.657530 kernel: audit: type=1130 audit(1707776069.651:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:29.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:29.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:29.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:29.649761 systemd[1]: Stopped kubelet.service. Feb 12 22:14:29.652421 systemd[1]: Started kubelet.service. Feb 12 22:14:29.708869 kubelet[1672]: E0212 22:14:29.708842 1672 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:14:29.711106 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:14:29.711185 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:14:29.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:14:29.713846 kernel: audit: type=1131 audit(1707776069.710:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:14:30.828928 env[1161]: time="2024-02-12T22:14:30.828888206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:30.840071 env[1161]: time="2024-02-12T22:14:30.840046856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:30.849687 env[1161]: time="2024-02-12T22:14:30.849664030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:30.859043 env[1161]: time="2024-02-12T22:14:30.859025712Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:30.859494 env[1161]: time="2024-02-12T22:14:30.859475608Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 22:14:30.897622 env[1161]: time="2024-02-12T22:14:30.897586163Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 22:14:31.426011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount935919216.mount: Deactivated successfully. Feb 12 22:14:32.289320 env[1161]: time="2024-02-12T22:14:32.289289876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:32.300606 env[1161]: time="2024-02-12T22:14:32.300588426Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:32.307213 env[1161]: time="2024-02-12T22:14:32.307197149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:32.317271 env[1161]: time="2024-02-12T22:14:32.317246389Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:32.317754 env[1161]: time="2024-02-12T22:14:32.317732326Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 22:14:34.076050 systemd[1]: Stopped kubelet.service. Feb 12 22:14:34.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:34.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:34.081019 kernel: audit: type=1130 audit(1707776074.075:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:34.081055 kernel: audit: type=1131 audit(1707776074.075:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:34.089150 systemd[1]: Reloading. Feb 12 22:14:34.153089 /usr/lib/systemd/system-generators/torcx-generator[1760]: time="2024-02-12T22:14:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:14:34.153288 /usr/lib/systemd/system-generators/torcx-generator[1760]: time="2024-02-12T22:14:34Z" level=info msg="torcx already run" Feb 12 22:14:34.202588 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:14:34.202685 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:14:34.214569 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.257170 kernel: audit: type=1400 audit(1707776074.251:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.257204 kernel: audit: type=1400 audit(1707776074.251:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.257220 kernel: audit: type=1400 audit(1707776074.251:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.261761 kernel: audit: type=1400 audit(1707776074.251:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.261790 kernel: audit: type=1400 audit(1707776074.251:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.266375 kernel: audit: type=1400 audit(1707776074.251:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.266405 kernel: audit: type=1400 audit(1707776074.251:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271025 kernel: audit: type=1400 audit(1707776074.251:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit: BPF prog-id=52 op=LOAD Feb 12 22:14:34.258000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit: BPF prog-id=53 op=LOAD Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.267000 audit: BPF prog-id=54 op=LOAD Feb 12 22:14:34.267000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:14:34.267000 audit: BPF prog-id=39 op=UNLOAD Feb 12 22:14:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit: BPF prog-id=55 op=LOAD Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.271000 audit: BPF prog-id=56 op=LOAD Feb 12 22:14:34.271000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:14:34.271000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit: BPF prog-id=57 op=LOAD Feb 12 22:14:34.273000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.273000 audit: BPF prog-id=58 op=LOAD Feb 12 22:14:34.273000 audit: BPF prog-id=43 op=UNLOAD Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.274000 audit: BPF prog-id=59 op=LOAD Feb 12 22:14:34.274000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.275000 audit: BPF prog-id=60 op=LOAD Feb 12 22:14:34.275000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit: BPF prog-id=61 op=LOAD Feb 12 22:14:34.276000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit: BPF prog-id=62 op=LOAD Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit: BPF prog-id=63 op=LOAD Feb 12 22:14:34.277000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:14:34.277000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit: BPF prog-id=64 op=LOAD Feb 12 22:14:34.278000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit: BPF prog-id=65 op=LOAD Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.279000 audit: BPF prog-id=66 op=LOAD Feb 12 22:14:34.279000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:14:34.279000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:14:34.291744 systemd[1]: Started kubelet.service. Feb 12 22:14:34.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:34.322500 kubelet[1820]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:14:34.322500 kubelet[1820]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:14:34.322704 kubelet[1820]: I0212 22:14:34.322520 1820 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:14:34.324065 kubelet[1820]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:14:34.324065 kubelet[1820]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:14:34.670030 kubelet[1820]: I0212 22:14:34.670014 1820 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:14:34.670030 kubelet[1820]: I0212 22:14:34.670027 1820 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:14:34.670153 kubelet[1820]: I0212 22:14:34.670142 1820 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:14:34.682043 kubelet[1820]: I0212 22:14:34.682033 1820 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:14:34.682217 kubelet[1820]: E0212 22:14:34.682208 1820 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.100:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.684203 kubelet[1820]: I0212 22:14:34.684194 1820 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:14:34.684367 kubelet[1820]: I0212 22:14:34.684358 1820 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:14:34.684456 kubelet[1820]: I0212 22:14:34.684448 1820 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:14:34.684546 kubelet[1820]: I0212 22:14:34.684539 1820 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:14:34.684590 kubelet[1820]: I0212 22:14:34.684584 1820 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:14:34.685272 kubelet[1820]: I0212 22:14:34.685265 1820 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:14:34.691668 kubelet[1820]: I0212 22:14:34.691660 1820 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:14:34.691739 kubelet[1820]: I0212 22:14:34.691732 1820 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:14:34.691791 kubelet[1820]: I0212 22:14:34.691784 1820 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:14:34.691843 kubelet[1820]: I0212 22:14:34.691836 1820 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:14:34.692410 kubelet[1820]: W0212 22:14:34.692387 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.692440 kubelet[1820]: E0212 22:14:34.692416 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.693529 kubelet[1820]: I0212 22:14:34.693522 1820 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:14:34.693693 kubelet[1820]: W0212 22:14:34.693686 1820 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:14:34.695361 kubelet[1820]: I0212 22:14:34.695354 1820 server.go:1186] "Started kubelet" Feb 12 22:14:34.695470 kubelet[1820]: W0212 22:14:34.695454 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.695519 kubelet[1820]: E0212 22:14:34.695512 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.697531 kubelet[1820]: I0212 22:14:34.697520 1820 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:14:34.698191 kubelet[1820]: E0212 22:14:34.698153 1820 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab02079c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 695342530, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 695342530, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.70.100:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.100:6443: connect: connection refused'(may retry after sleeping) Feb 12 22:14:34.698664 kubelet[1820]: I0212 22:14:34.698651 1820 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:14:34.699717 kubelet[1820]: E0212 22:14:34.699709 1820 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:14:34.699774 kubelet[1820]: E0212 22:14:34.699767 1820 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:14:34.699000 audit[1820]: AVC avc: denied { mac_admin } for pid=1820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.699000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:14:34.699000 audit[1820]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a634a0 a1=c000a52f18 a2=c000a63470 a3=25 items=0 ppid=1 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.699000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:14:34.699000 audit[1820]: AVC avc: denied { mac_admin } for pid=1820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.699000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:14:34.699000 audit[1820]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a4b980 a1=c000a52f30 a2=c000a63530 a3=25 items=0 ppid=1 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.699000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:14:34.700434 kubelet[1820]: I0212 22:14:34.700112 1820 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:14:34.700434 kubelet[1820]: I0212 22:14:34.700139 1820 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:14:34.700434 kubelet[1820]: I0212 22:14:34.700176 1820 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:14:34.701000 audit[1830]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.701000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8daee740 a2=0 a3=7ffd8daee72c items=0 ppid=1820 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:14:34.702404 kubelet[1820]: I0212 22:14:34.702325 1820 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:14:34.702000 audit[1831]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.702000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff81602220 a2=0 a3=7fff8160220c items=0 ppid=1820 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:14:34.703021 kubelet[1820]: I0212 22:14:34.703003 1820 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:14:34.703995 kubelet[1820]: E0212 22:14:34.703984 1820 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.703000 audit[1833]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.703000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc9ed54c0 a2=0 a3=7fffc9ed54ac items=0 ppid=1820 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:14:34.704733 kubelet[1820]: W0212 22:14:34.704717 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.704787 kubelet[1820]: E0212 22:14:34.704780 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.704000 audit[1835]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.704000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc5d32280 a2=0 a3=7fffc5d3226c items=0 ppid=1820 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:14:34.708000 audit[1838]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.708000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc125d7540 a2=0 a3=7ffc125d752c items=0 ppid=1820 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:14:34.709000 audit[1839]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.709000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcee6e3530 a2=0 a3=7ffcee6e351c items=0 ppid=1820 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:14:34.715767 systemd[1]: Started sshd@18-139.178.70.100:22-187.190.112.180:28236.service. Feb 12 22:14:34.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-187.190.112.180:28236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:34.721000 audit[1845]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.721000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe73449690 a2=0 a3=7ffe7344967c items=0 ppid=1820 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:14:34.727000 audit[1848]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.727000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffdfec0ebb0 a2=0 a3=7ffdfec0eb9c items=0 ppid=1820 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:14:34.729000 audit[1849]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.729000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc52d28960 a2=0 a3=7ffc52d2894c items=0 ppid=1820 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:14:34.730000 audit[1850]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.730000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc6c681f0 a2=0 a3=7ffcc6c681dc items=0 ppid=1820 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:14:34.732000 audit[1852]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.732000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2d36f170 a2=0 a3=7ffd2d36f15c items=0 ppid=1820 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:14:34.733000 audit[1855]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.733000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdb37a7150 a2=0 a3=7ffdb37a713c items=0 ppid=1820 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:14:34.735000 audit[1857]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.735000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffcfd3e3890 a2=0 a3=7ffcfd3e387c items=0 ppid=1820 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:14:34.736000 audit[1859]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.736000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd17a153b0 a2=0 a3=7ffd17a1539c items=0 ppid=1820 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:14:34.737000 audit[1861]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.737000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffc67260e60 a2=0 a3=7ffc67260e4c items=0 ppid=1820 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:14:34.738537 kubelet[1820]: I0212 22:14:34.738528 1820 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:14:34.738000 audit[1862]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.738000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdeaaef5f0 a2=0 a3=7ffdeaaef5dc items=0 ppid=1820 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:14:34.738000 audit[1863]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.738000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc750265a0 a2=0 a3=7ffc7502658c items=0 ppid=1820 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:14:34.739000 audit[1864]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.739000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe4bfee3a0 a2=0 a3=7ffe4bfee38c items=0 ppid=1820 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:14:34.739000 audit[1865]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.739000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccc2af190 a2=0 a3=7ffccc2af17c items=0 ppid=1820 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:14:34.741000 audit[1867]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:34.741000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2b431160 a2=0 a3=7ffe2b43114c items=0 ppid=1820 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:14:34.741000 audit[1868]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.741000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeda674690 a2=0 a3=7ffeda67467c items=0 ppid=1820 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:14:34.742000 audit[1869]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.742000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc4fe94ec0 a2=0 a3=7ffc4fe94eac items=0 ppid=1820 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:14:34.744052 kubelet[1820]: I0212 22:14:34.744044 1820 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:14:34.744098 kubelet[1820]: I0212 22:14:34.744091 1820 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:14:34.744146 kubelet[1820]: I0212 22:14:34.744139 1820 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:14:34.744978 kubelet[1820]: I0212 22:14:34.744970 1820 policy_none.go:49] "None policy: Start" Feb 12 22:14:34.744000 audit[1873]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.744000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff3d3a8cb0 a2=0 a3=7fff3d3a8c9c items=0 ppid=1820 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:14:34.746182 kubelet[1820]: I0212 22:14:34.746171 1820 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:14:34.746216 kubelet[1820]: I0212 22:14:34.746185 1820 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:14:34.746000 audit[1876]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.746000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcbdef7360 a2=0 a3=7ffcbdef734c items=0 ppid=1820 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:14:34.747000 audit[1877]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.747000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd96f314e0 a2=0 a3=7ffd96f314cc items=0 ppid=1820 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:14:34.749197 systemd[1]: Created slice kubepods.slice. Feb 12 22:14:34.751349 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:14:34.753418 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:14:34.753000 audit[1879]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.753000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdc645cdb0 a2=0 a3=7ffdc645cd9c items=0 ppid=1820 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:14:34.754000 audit[1881]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.754000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee92718e0 a2=0 a3=7ffee92718cc items=0 ppid=1820 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:14:34.756000 audit[1883]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.756000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fffc63d34c0 a2=0 a3=7fffc63d34ac items=0 ppid=1820 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:14:34.758218 kubelet[1820]: I0212 22:14:34.758203 1820 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:14:34.757000 audit[1820]: AVC avc: denied { mac_admin } for pid=1820 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:34.757000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:14:34.757000 audit[1820]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006f70b0 a1=c000de7350 a2=c0006f7050 a3=25 items=0 ppid=1 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.757000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:14:34.758398 kubelet[1820]: I0212 22:14:34.758233 1820 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:14:34.758398 kubelet[1820]: I0212 22:14:34.758346 1820 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:14:34.758750 kubelet[1820]: E0212 22:14:34.758743 1820 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 22:14:34.759000 audit[1885]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.759000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd2e57ce90 a2=0 a3=7ffd2e57ce7c items=0 ppid=1820 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:14:34.761000 audit[1887]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.761000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffdace92770 a2=0 a3=7ffdace9275c items=0 ppid=1820 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:14:34.762553 kubelet[1820]: I0212 22:14:34.762547 1820 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:14:34.762605 kubelet[1820]: I0212 22:14:34.762599 1820 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:14:34.762661 kubelet[1820]: I0212 22:14:34.762655 1820 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:14:34.762725 kubelet[1820]: E0212 22:14:34.762720 1820 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 22:14:34.763016 kubelet[1820]: W0212 22:14:34.762999 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.763126 kubelet[1820]: E0212 22:14:34.763120 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:34.762000 audit[1888]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.762000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca09d2260 a2=0 a3=7ffca09d224c items=0 ppid=1820 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:14:34.763000 audit[1889]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.763000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe667bea50 a2=0 a3=7ffe667bea3c items=0 ppid=1820 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:14:34.763000 audit[1890]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:34.763000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe874dead0 a2=0 a3=7ffe874deabc items=0 ppid=1820 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:34.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:14:34.803493 kubelet[1820]: I0212 22:14:34.803475 1820 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:14:34.803675 kubelet[1820]: E0212 22:14:34.803661 1820 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" Feb 12 22:14:34.862982 kubelet[1820]: I0212 22:14:34.862939 1820 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:34.864057 kubelet[1820]: I0212 22:14:34.864043 1820 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:34.865522 kubelet[1820]: I0212 22:14:34.865510 1820 status_manager.go:698] "Failed to get status for pod" podUID=217f037cf98ceb5ea05958260d88eaf9 pod="kube-system/kube-apiserver-localhost" err="Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-localhost\": dial tcp 139.178.70.100:6443: connect: connection refused" Feb 12 22:14:34.865895 kubelet[1820]: I0212 22:14:34.865566 1820 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:34.866342 kubelet[1820]: I0212 22:14:34.866289 1820 status_manager.go:698] "Failed to get status for pod" podUID=550020dd9f101bcc23e1d3c651841c4d pod="kube-system/kube-controller-manager-localhost" err="Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-localhost\": dial tcp 139.178.70.100:6443: connect: connection refused" Feb 12 22:14:34.867760 kubelet[1820]: I0212 22:14:34.867734 1820 status_manager.go:698] "Failed to get status for pod" podUID=72ae17a74a2eae76daac6d298477aff0 pod="kube-system/kube-scheduler-localhost" err="Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-localhost\": dial tcp 139.178.70.100:6443: connect: connection refused" Feb 12 22:14:34.870218 systemd[1]: Created slice kubepods-burstable-pod217f037cf98ceb5ea05958260d88eaf9.slice. Feb 12 22:14:34.877542 systemd[1]: Created slice kubepods-burstable-pod550020dd9f101bcc23e1d3c651841c4d.slice. Feb 12 22:14:34.885245 systemd[1]: Created slice kubepods-burstable-pod72ae17a74a2eae76daac6d298477aff0.slice. Feb 12 22:14:34.905378 kubelet[1820]: E0212 22:14:34.905350 1820 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:35.004806 kubelet[1820]: I0212 22:14:35.004722 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:35.004806 kubelet[1820]: I0212 22:14:35.004762 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72ae17a74a2eae76daac6d298477aff0-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"72ae17a74a2eae76daac6d298477aff0\") " pod="kube-system/kube-scheduler-localhost" Feb 12 22:14:35.004806 kubelet[1820]: I0212 22:14:35.004780 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/217f037cf98ceb5ea05958260d88eaf9-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"217f037cf98ceb5ea05958260d88eaf9\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:35.005752 kubelet[1820]: I0212 22:14:35.004794 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/217f037cf98ceb5ea05958260d88eaf9-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"217f037cf98ceb5ea05958260d88eaf9\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:35.005905 kubelet[1820]: I0212 22:14:35.005882 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/217f037cf98ceb5ea05958260d88eaf9-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"217f037cf98ceb5ea05958260d88eaf9\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:35.006028 kubelet[1820]: I0212 22:14:35.006013 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:35.006126 kubelet[1820]: I0212 22:14:35.006117 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:35.006222 kubelet[1820]: I0212 22:14:35.006213 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:35.006349 kubelet[1820]: I0212 22:14:35.006331 1820 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:35.006999 kubelet[1820]: I0212 22:14:35.006974 1820 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:14:35.007540 kubelet[1820]: E0212 22:14:35.007530 1820 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" Feb 12 22:14:35.176307 env[1161]: time="2024-02-12T22:14:35.176222869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:217f037cf98ceb5ea05958260d88eaf9,Namespace:kube-system,Attempt:0,}" Feb 12 22:14:35.184075 env[1161]: time="2024-02-12T22:14:35.184060973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:550020dd9f101bcc23e1d3c651841c4d,Namespace:kube-system,Attempt:0,}" Feb 12 22:14:35.187047 env[1161]: time="2024-02-12T22:14:35.187034915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:72ae17a74a2eae76daac6d298477aff0,Namespace:kube-system,Attempt:0,}" Feb 12 22:14:35.210218 sshd[1844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.112.180 user=root Feb 12 22:14:35.209000 audit[1844]: USER_AUTH pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=187.190.112.180 addr=187.190.112.180 terminal=ssh res=failed' Feb 12 22:14:35.306398 kubelet[1820]: E0212 22:14:35.306334 1820 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:35.408639 kubelet[1820]: I0212 22:14:35.408614 1820 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:14:35.408890 kubelet[1820]: E0212 22:14:35.408824 1820 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" Feb 12 22:14:35.507604 kubelet[1820]: W0212 22:14:35.507564 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:35.507604 kubelet[1820]: E0212 22:14:35.507608 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:35.618325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount322581652.mount: Deactivated successfully. Feb 12 22:14:35.618748 env[1161]: time="2024-02-12T22:14:35.618559785Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.619903 env[1161]: time="2024-02-12T22:14:35.619886628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.621101 env[1161]: time="2024-02-12T22:14:35.621085678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.621933 env[1161]: time="2024-02-12T22:14:35.621918280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.622325 env[1161]: time="2024-02-12T22:14:35.622311341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.622770 env[1161]: time="2024-02-12T22:14:35.622756399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.624858 env[1161]: time="2024-02-12T22:14:35.624843500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.626860 env[1161]: time="2024-02-12T22:14:35.626846346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.647885 env[1161]: time="2024-02-12T22:14:35.647867379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.648245 env[1161]: time="2024-02-12T22:14:35.638748177Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:35.648245 env[1161]: time="2024-02-12T22:14:35.638781922Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:35.648245 env[1161]: time="2024-02-12T22:14:35.638788768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:35.648245 env[1161]: time="2024-02-12T22:14:35.638888041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c01be7764315db9fa793a2258bec680e65f75071b302abc1c5e397d8c573f81 pid=1899 runtime=io.containerd.runc.v2 Feb 12 22:14:35.648674 env[1161]: time="2024-02-12T22:14:35.648662778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.649144 env[1161]: time="2024-02-12T22:14:35.649132798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.654410 env[1161]: time="2024-02-12T22:14:35.654397393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:35.668289 systemd[1]: Started cri-containerd-2c01be7764315db9fa793a2258bec680e65f75071b302abc1c5e397d8c573f81.scope. Feb 12 22:14:35.672057 env[1161]: time="2024-02-12T22:14:35.663327278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:35.672057 env[1161]: time="2024-02-12T22:14:35.663345569Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:35.672057 env[1161]: time="2024-02-12T22:14:35.663352210Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:35.672057 env[1161]: time="2024-02-12T22:14:35.663404108Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6108665612ae457fdb1ee657167ff8c644253584bddb7d3d18b20fa61878797 pid=1918 runtime=io.containerd.runc.v2 Feb 12 22:14:35.672577 env[1161]: time="2024-02-12T22:14:35.666628816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:35.672577 env[1161]: time="2024-02-12T22:14:35.666645930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:35.672577 env[1161]: time="2024-02-12T22:14:35.666652273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:35.672577 env[1161]: time="2024-02-12T22:14:35.666709538Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd234dd947a254429646451ba1771b2a46fe053a3662ff837c73f78c03640381 pid=1938 runtime=io.containerd.runc.v2 Feb 12 22:14:35.681575 systemd[1]: Started cri-containerd-a6108665612ae457fdb1ee657167ff8c644253584bddb7d3d18b20fa61878797.scope. Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.685000 audit: BPF prog-id=67 op=LOAD Feb 12 22:14:35.686000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.686000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1899 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303162653737363433313564623966613739336132323538626563 Feb 12 22:14:35.686000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.686000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1899 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303162653737363433313564623966613739336132323538626563 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.688000 audit: BPF prog-id=68 op=LOAD Feb 12 22:14:35.688000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0f30 items=0 ppid=1899 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303162653737363433313564623966613739336132323538626563 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit: BPF prog-id=69 op=LOAD Feb 12 22:14:35.689000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0f78 items=0 ppid=1899 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303162653737363433313564623966613739336132323538626563 Feb 12 22:14:35.689000 audit: BPF prog-id=69 op=UNLOAD Feb 12 22:14:35.689000 audit: BPF prog-id=68 op=UNLOAD Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.689000 audit: BPF prog-id=70 op=LOAD Feb 12 22:14:35.689000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c1388 items=0 ppid=1899 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263303162653737363433313564623966613739336132323538626563 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit: BPF prog-id=71 op=LOAD Feb 12 22:14:35.691000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.691000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1918 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313038363635363132616534353766646231656536353731363766 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1918 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313038363635363132616534353766646231656536353731363766 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit: BPF prog-id=72 op=LOAD Feb 12 22:14:35.694000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021e350 items=0 ppid=1918 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313038363635363132616534353766646231656536353731363766 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.694000 audit: BPF prog-id=73 op=LOAD Feb 12 22:14:35.694000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021e398 items=0 ppid=1918 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313038363635363132616534353766646231656536353731363766 Feb 12 22:14:35.695000 audit: BPF prog-id=73 op=UNLOAD Feb 12 22:14:35.695000 audit: BPF prog-id=72 op=UNLOAD Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { perfmon } for pid=1953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit[1953]: AVC avc: denied { bpf } for pid=1953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.695000 audit: BPF prog-id=74 op=LOAD Feb 12 22:14:35.695000 audit[1953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021e7a8 items=0 ppid=1918 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313038363635363132616534353766646231656536353731363766 Feb 12 22:14:35.717203 env[1161]: time="2024-02-12T22:14:35.717181699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:217f037cf98ceb5ea05958260d88eaf9,Namespace:kube-system,Attempt:0,} returns sandbox id \"a6108665612ae457fdb1ee657167ff8c644253584bddb7d3d18b20fa61878797\"" Feb 12 22:14:35.719403 env[1161]: time="2024-02-12T22:14:35.719390214Z" level=info msg="CreateContainer within sandbox \"a6108665612ae457fdb1ee657167ff8c644253584bddb7d3d18b20fa61878797\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 22:14:35.721777 systemd[1]: Started cri-containerd-fd234dd947a254429646451ba1771b2a46fe053a3662ff837c73f78c03640381.scope. Feb 12 22:14:35.727361 env[1161]: time="2024-02-12T22:14:35.727329502Z" level=info msg="CreateContainer within sandbox \"a6108665612ae457fdb1ee657167ff8c644253584bddb7d3d18b20fa61878797\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"deadc84b9fcfedaf9d579cba9e9a734b4cc1c272d4f67b489ae21103beab6f23\"" Feb 12 22:14:35.727867 env[1161]: time="2024-02-12T22:14:35.727856043Z" level=info msg="StartContainer for \"deadc84b9fcfedaf9d579cba9e9a734b4cc1c272d4f67b489ae21103beab6f23\"" Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.730000 audit: BPF prog-id=75 op=LOAD Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1938 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664323334646439343761323534343239363436343531626131373731 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1938 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664323334646439343761323534343239363436343531626131373731 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732580 env[1161]: time="2024-02-12T22:14:35.732564325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:550020dd9f101bcc23e1d3c651841c4d,Namespace:kube-system,Attempt:0,} returns sandbox id \"2c01be7764315db9fa793a2258bec680e65f75071b302abc1c5e397d8c573f81\"" Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.731000 audit: BPF prog-id=76 op=LOAD Feb 12 22:14:35.731000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00022b970 items=0 ppid=1938 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664323334646439343761323534343239363436343531626131373731 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit: BPF prog-id=77 op=LOAD Feb 12 22:14:35.732000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00022b9b8 items=0 ppid=1938 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664323334646439343761323534343239363436343531626131373731 Feb 12 22:14:35.732000 audit: BPF prog-id=77 op=UNLOAD Feb 12 22:14:35.732000 audit: BPF prog-id=76 op=UNLOAD Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { perfmon } for pid=1974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.735182 env[1161]: time="2024-02-12T22:14:35.735167764Z" level=info msg="CreateContainer within sandbox \"2c01be7764315db9fa793a2258bec680e65f75071b302abc1c5e397d8c573f81\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 22:14:35.732000 audit[1974]: AVC avc: denied { bpf } for pid=1974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.732000 audit: BPF prog-id=78 op=LOAD Feb 12 22:14:35.732000 audit[1974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00022bdc8 items=0 ppid=1938 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664323334646439343761323534343239363436343531626131373731 Feb 12 22:14:35.745869 kubelet[1820]: W0212 22:14:35.745814 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:35.745869 kubelet[1820]: E0212 22:14:35.745857 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:35.751841 env[1161]: time="2024-02-12T22:14:35.751740498Z" level=info msg="CreateContainer within sandbox \"2c01be7764315db9fa793a2258bec680e65f75071b302abc1c5e397d8c573f81\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b7c862fd6714c98d80a2b38ab79466693ac5ade5d314d3bf377e439662592a48\"" Feb 12 22:14:35.752124 env[1161]: time="2024-02-12T22:14:35.752111693Z" level=info msg="StartContainer for \"b7c862fd6714c98d80a2b38ab79466693ac5ade5d314d3bf377e439662592a48\"" Feb 12 22:14:35.754722 systemd[1]: Started cri-containerd-deadc84b9fcfedaf9d579cba9e9a734b4cc1c272d4f67b489ae21103beab6f23.scope. Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.764000 audit: BPF prog-id=79 op=LOAD Feb 12 22:14:35.765000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.765000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1918 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616463383462396663666564616639643537396362613965396137 Feb 12 22:14:35.766000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.766000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1918 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616463383462396663666564616639643537396362613965396137 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.767000 audit: BPF prog-id=80 op=LOAD Feb 12 22:14:35.767000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002216b0 items=0 ppid=1918 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616463383462396663666564616639643537396362613965396137 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769664 systemd[1]: Started cri-containerd-b7c862fd6714c98d80a2b38ab79466693ac5ade5d314d3bf377e439662592a48.scope. Feb 12 22:14:35.768000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.768000 audit: BPF prog-id=81 op=LOAD Feb 12 22:14:35.768000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002216f8 items=0 ppid=1918 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616463383462396663666564616639643537396362613965396137 Feb 12 22:14:35.769000 audit: BPF prog-id=81 op=UNLOAD Feb 12 22:14:35.769000 audit: BPF prog-id=80 op=UNLOAD Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { perfmon } for pid=2018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit[2018]: AVC avc: denied { bpf } for pid=2018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.769000 audit: BPF prog-id=82 op=LOAD Feb 12 22:14:35.769000 audit[2018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221b08 items=0 ppid=1918 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616463383462396663666564616639643537396362613965396137 Feb 12 22:14:35.777950 env[1161]: time="2024-02-12T22:14:35.777931592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:72ae17a74a2eae76daac6d298477aff0,Namespace:kube-system,Attempt:0,} returns sandbox id \"fd234dd947a254429646451ba1771b2a46fe053a3662ff837c73f78c03640381\"" Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.777000 audit: BPF prog-id=83 op=LOAD Feb 12 22:14:35.778000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779648 env[1161]: time="2024-02-12T22:14:35.779545541Z" level=info msg="CreateContainer within sandbox \"fd234dd947a254429646451ba1771b2a46fe053a3662ff837c73f78c03640381\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 22:14:35.778000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1899 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633836326664363731346339386438306132623338616237393436 Feb 12 22:14:35.778000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.778000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1899 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633836326664363731346339386438306132623338616237393436 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.779000 audit: BPF prog-id=84 op=LOAD Feb 12 22:14:35.779000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c8b90 items=0 ppid=1899 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633836326664363731346339386438306132623338616237393436 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.780000 audit: BPF prog-id=85 op=LOAD Feb 12 22:14:35.780000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c8bd8 items=0 ppid=1899 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633836326664363731346339386438306132623338616237393436 Feb 12 22:14:35.781000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:14:35.781000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.781000 audit: BPF prog-id=86 op=LOAD Feb 12 22:14:35.781000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c8fe8 items=0 ppid=1899 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633836326664363731346339386438306132623338616237393436 Feb 12 22:14:35.794234 env[1161]: time="2024-02-12T22:14:35.794214778Z" level=info msg="CreateContainer within sandbox \"fd234dd947a254429646451ba1771b2a46fe053a3662ff837c73f78c03640381\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"535c2a47faab39e6f486573c6bff0540d16705264822931467233f178eb85916\"" Feb 12 22:14:35.794541 env[1161]: time="2024-02-12T22:14:35.794529857Z" level=info msg="StartContainer for \"535c2a47faab39e6f486573c6bff0540d16705264822931467233f178eb85916\"" Feb 12 22:14:35.805701 env[1161]: time="2024-02-12T22:14:35.805678352Z" level=info msg="StartContainer for \"deadc84b9fcfedaf9d579cba9e9a734b4cc1c272d4f67b489ae21103beab6f23\" returns successfully" Feb 12 22:14:35.809262 env[1161]: time="2024-02-12T22:14:35.809246885Z" level=info msg="StartContainer for \"b7c862fd6714c98d80a2b38ab79466693ac5ade5d314d3bf377e439662592a48\" returns successfully" Feb 12 22:14:35.815646 systemd[1]: Started cri-containerd-535c2a47faab39e6f486573c6bff0540d16705264822931467233f178eb85916.scope. Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit: BPF prog-id=87 op=LOAD Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1938 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356332613437666161623339653666343836353733633662666630 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1938 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356332613437666161623339653666343836353733633662666630 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.823000 audit: BPF prog-id=88 op=LOAD Feb 12 22:14:35.823000 audit[2082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027bdc0 items=0 ppid=1938 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356332613437666161623339653666343836353733633662666630 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit: BPF prog-id=89 op=LOAD Feb 12 22:14:35.824000 audit[2082]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027be08 items=0 ppid=1938 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356332613437666161623339653666343836353733633662666630 Feb 12 22:14:35.824000 audit: BPF prog-id=89 op=UNLOAD Feb 12 22:14:35.824000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { perfmon } for pid=2082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit[2082]: AVC avc: denied { bpf } for pid=2082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:35.824000 audit: BPF prog-id=90 op=LOAD Feb 12 22:14:35.824000 audit[2082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec218 items=0 ppid=1938 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:35.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356332613437666161623339653666343836353733633662666630 Feb 12 22:14:35.850053 env[1161]: time="2024-02-12T22:14:35.850024616Z" level=info msg="StartContainer for \"535c2a47faab39e6f486573c6bff0540d16705264822931467233f178eb85916\" returns successfully" Feb 12 22:14:36.107085 kubelet[1820]: E0212 22:14:36.107049 1820 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:36.171902 kubelet[1820]: W0212 22:14:36.171842 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:36.171902 kubelet[1820]: E0212 22:14:36.171879 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:36.210110 kubelet[1820]: I0212 22:14:36.209945 1820 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:14:36.210110 kubelet[1820]: E0212 22:14:36.210094 1820 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" Feb 12 22:14:36.256704 kubelet[1820]: W0212 22:14:36.256666 1820 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:36.256704 kubelet[1820]: E0212 22:14:36.256685 1820 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused Feb 12 22:14:36.817000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:36.817000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0011cc000 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:36.817000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:36.818000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:36.818000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0011bc040 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:36.818000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:36.863931 sshd[1844]: Failed password for root from 187.190.112.180 port 28236 ssh2 Feb 12 22:14:36.999718 sshd[1844]: Received disconnect from 187.190.112.180 port 28236:11: Bye Bye [preauth] Feb 12 22:14:36.999718 sshd[1844]: Disconnected from authenticating user root 187.190.112.180 port 28236 [preauth] Feb 12 22:14:37.000393 systemd[1]: sshd@18-139.178.70.100:22-187.190.112.180:28236.service: Deactivated successfully. Feb 12 22:14:36.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-187.190.112.180:28236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:37.342000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:37.342000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0049c4000 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:14:37.343000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6507 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:37.343000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0045f2810 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:14:37.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:14:37.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:14:37.343000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:37.343000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00362c1a0 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:14:37.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:14:37.345000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6513 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:37.345000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0057560f0 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:14:37.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:14:37.357000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:37.357000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c003820d40 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:14:37.357000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:14:37.359000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:37.359000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00587fd10 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:14:37.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:14:37.494437 kubelet[1820]: E0212 22:14:37.494380 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab02079c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 695342530, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 695342530, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.546946 kubelet[1820]: E0212 22:14:37.546871 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab063d74d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 699757389, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 699757389, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.599430 kubelet[1820]: E0212 22:14:37.599297 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fd59df", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node localhost status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743372255, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743372255, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.652567 kubelet[1820]: E0212 22:14:37.652506 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fd6a36", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node localhost status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743376438, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743376438, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.705718 kubelet[1820]: E0212 22:14:37.705638 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fdafbd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node localhost status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743394237, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743394237, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.710883 kubelet[1820]: E0212 22:14:37.710863 1820 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 12 22:14:37.757790 kubelet[1820]: E0212 22:14:37.757748 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab3f64772", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 759686002, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 759686002, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.811531 kubelet[1820]: I0212 22:14:37.811482 1820 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:14:37.812209 kubelet[1820]: E0212 22:14:37.812137 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fd59df", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node localhost status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743372255, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 803439292, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.866813 kubelet[1820]: E0212 22:14:37.866688 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fd6a36", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node localhost status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743376438, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 803447274, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:37.921928 kubelet[1820]: E0212 22:14:37.921863 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fdafbd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node localhost status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743394237, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 803449463, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:38.295342 kubelet[1820]: E0212 22:14:38.295276 1820 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33d4ab2fd59df", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node localhost status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 743372255, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 14, 34, 863989245, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:14:38.297897 kubelet[1820]: I0212 22:14:38.297879 1820 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 22:14:38.696773 kubelet[1820]: I0212 22:14:38.696759 1820 apiserver.go:52] "Watching apiserver" Feb 12 22:14:39.104042 kubelet[1820]: I0212 22:14:39.103980 1820 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:14:39.129565 kubelet[1820]: I0212 22:14:39.129554 1820 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:14:39.856646 systemd[1]: Reloading. Feb 12 22:14:39.908335 /usr/lib/systemd/system-generators/torcx-generator[2155]: time="2024-02-12T22:14:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:14:39.908534 /usr/lib/systemd/system-generators/torcx-generator[2155]: time="2024-02-12T22:14:39Z" level=info msg="torcx already run" Feb 12 22:14:39.957737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:14:39.957751 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:14:39.970374 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:14:40.022964 kernel: kauditd_printk_skb: 645 callbacks suppressed Feb 12 22:14:40.023025 kernel: audit: type=1400 audit(1707776080.019:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.023853 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:14:40.027485 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:14:40.027511 kernel: audit: type=1400 audit(1707776080.019:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.027527 kernel: audit: backlog limit exceeded Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.030315 kernel: audit: type=1400 audit(1707776080.019:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.030341 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.034983 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:14:40.035016 kernel: audit: backlog limit exceeded Feb 12 22:14:40.035031 kernel: audit: type=1400 audit(1707776080.019:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit: BPF prog-id=91 op=LOAD Feb 12 22:14:40.022000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit: BPF prog-id=92 op=LOAD Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit: BPF prog-id=93 op=LOAD Feb 12 22:14:40.022000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:14:40.022000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit: BPF prog-id=94 op=LOAD Feb 12 22:14:40.022000 audit: BPF prog-id=83 op=UNLOAD Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit: BPF prog-id=95 op=LOAD Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.022000 audit: BPF prog-id=96 op=LOAD Feb 12 22:14:40.022000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:14:40.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.033000 audit: BPF prog-id=75 op=UNLOAD Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.035000 audit: BPF prog-id=101 op=LOAD Feb 12 22:14:40.035000 audit: BPF prog-id=59 op=UNLOAD Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit: BPF prog-id=102 op=LOAD Feb 12 22:14:40.036000 audit: BPF prog-id=60 op=UNLOAD Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.036000 audit: BPF prog-id=103 op=LOAD Feb 12 22:14:40.036000 audit: BPF prog-id=71 op=UNLOAD Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit: BPF prog-id=104 op=LOAD Feb 12 22:14:40.037000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit: BPF prog-id=105 op=LOAD Feb 12 22:14:40.037000 audit: BPF prog-id=61 op=UNLOAD Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.037000 audit: BPF prog-id=106 op=LOAD Feb 12 22:14:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit: BPF prog-id=107 op=LOAD Feb 12 22:14:40.038000 audit: BPF prog-id=62 op=UNLOAD Feb 12 22:14:40.038000 audit: BPF prog-id=63 op=UNLOAD Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit: BPF prog-id=108 op=LOAD Feb 12 22:14:40.038000 audit: BPF prog-id=79 op=UNLOAD Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit: BPF prog-id=109 op=LOAD Feb 12 22:14:40.038000 audit: BPF prog-id=64 op=UNLOAD Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit: BPF prog-id=110 op=LOAD Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.038000 audit: BPF prog-id=111 op=LOAD Feb 12 22:14:40.038000 audit: BPF prog-id=65 op=UNLOAD Feb 12 22:14:40.038000 audit: BPF prog-id=66 op=UNLOAD Feb 12 22:14:40.050427 systemd[1]: Stopping kubelet.service... Feb 12 22:14:40.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:40.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:40.071170 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 22:14:40.071280 systemd[1]: Stopped kubelet.service. Feb 12 22:14:40.072523 systemd[1]: Started kubelet.service. Feb 12 22:14:40.133875 kubelet[2213]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:14:40.134098 kubelet[2213]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:14:40.134189 kubelet[2213]: I0212 22:14:40.134168 2213 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:14:40.135022 kubelet[2213]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:14:40.135064 kubelet[2213]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:14:40.137211 kubelet[2213]: I0212 22:14:40.137203 2213 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:14:40.137265 kubelet[2213]: I0212 22:14:40.137256 2213 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:14:40.137404 kubelet[2213]: I0212 22:14:40.137396 2213 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:14:40.138119 kubelet[2213]: I0212 22:14:40.138110 2213 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 22:14:40.138615 kubelet[2213]: I0212 22:14:40.138592 2213 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:14:40.140249 kubelet[2213]: I0212 22:14:40.140241 2213 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:14:40.140418 kubelet[2213]: I0212 22:14:40.140410 2213 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:14:40.140503 kubelet[2213]: I0212 22:14:40.140495 2213 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:14:40.140584 kubelet[2213]: I0212 22:14:40.140576 2213 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:14:40.140628 kubelet[2213]: I0212 22:14:40.140621 2213 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:14:40.140685 kubelet[2213]: I0212 22:14:40.140678 2213 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:14:40.142254 kubelet[2213]: I0212 22:14:40.142247 2213 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:14:40.142320 kubelet[2213]: I0212 22:14:40.142313 2213 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:14:40.142373 kubelet[2213]: I0212 22:14:40.142366 2213 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:14:40.142420 kubelet[2213]: I0212 22:14:40.142413 2213 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:14:40.146501 kubelet[2213]: I0212 22:14:40.143718 2213 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:14:40.146501 kubelet[2213]: I0212 22:14:40.144009 2213 server.go:1186] "Started kubelet" Feb 12 22:14:40.146501 kubelet[2213]: I0212 22:14:40.145729 2213 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:14:40.146501 kubelet[2213]: I0212 22:14:40.145749 2213 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:14:40.146501 kubelet[2213]: I0212 22:14:40.145765 2213 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:14:40.144000 audit[2213]: AVC avc: denied { mac_admin } for pid=2213 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.144000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:14:40.144000 audit[2213]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a436b0 a1=c0008ecf90 a2=c000a43680 a3=25 items=0 ppid=1 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:40.144000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:14:40.144000 audit[2213]: AVC avc: denied { mac_admin } for pid=2213 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.144000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:14:40.144000 audit[2213]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002e16a0 a1=c0008ecfa8 a2=c000a43740 a3=25 items=0 ppid=1 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:40.144000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:14:40.148738 kubelet[2213]: I0212 22:14:40.148724 2213 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:14:40.149766 kubelet[2213]: I0212 22:14:40.149752 2213 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:14:40.152887 kubelet[2213]: I0212 22:14:40.152878 2213 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:14:40.152986 kubelet[2213]: I0212 22:14:40.152978 2213 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:14:40.163839 kubelet[2213]: E0212 22:14:40.163823 2213 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:14:40.163913 kubelet[2213]: E0212 22:14:40.163906 2213 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:14:40.179297 kubelet[2213]: I0212 22:14:40.179277 2213 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:14:40.204729 kubelet[2213]: I0212 22:14:40.204717 2213 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:14:40.204816 kubelet[2213]: I0212 22:14:40.204808 2213 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:14:40.204889 kubelet[2213]: I0212 22:14:40.204882 2213 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:14:40.204950 kubelet[2213]: E0212 22:14:40.204944 2213 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:14:40.206797 kubelet[2213]: I0212 22:14:40.206788 2213 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:14:40.206865 kubelet[2213]: I0212 22:14:40.206858 2213 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:14:40.206912 kubelet[2213]: I0212 22:14:40.206905 2213 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:14:40.207052 kubelet[2213]: I0212 22:14:40.207044 2213 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 22:14:40.207130 kubelet[2213]: I0212 22:14:40.207112 2213 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 22:14:40.207187 kubelet[2213]: I0212 22:14:40.207180 2213 policy_none.go:49] "None policy: Start" Feb 12 22:14:40.208806 kubelet[2213]: I0212 22:14:40.208796 2213 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:14:40.208880 kubelet[2213]: I0212 22:14:40.208872 2213 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:14:40.209919 kubelet[2213]: I0212 22:14:40.209788 2213 state_mem.go:75] "Updated machine memory state" Feb 12 22:14:40.212304 kubelet[2213]: I0212 22:14:40.212296 2213 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:14:40.211000 audit[2213]: AVC avc: denied { mac_admin } for pid=2213 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:40.211000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:14:40.211000 audit[2213]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00152f200 a1=c0014e8858 a2=c00152f1d0 a3=25 items=0 ppid=1 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:40.211000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:14:40.212577 kubelet[2213]: I0212 22:14:40.212568 2213 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:14:40.212707 kubelet[2213]: I0212 22:14:40.212700 2213 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:14:40.252179 kubelet[2213]: I0212 22:14:40.252162 2213 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 22:14:40.257175 kubelet[2213]: I0212 22:14:40.257161 2213 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 22:14:40.257349 kubelet[2213]: I0212 22:14:40.257339 2213 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 22:14:40.305835 kubelet[2213]: I0212 22:14:40.305808 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:40.305938 kubelet[2213]: I0212 22:14:40.305873 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:40.305938 kubelet[2213]: I0212 22:14:40.305898 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:40.310965 kubelet[2213]: E0212 22:14:40.310950 2213 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:40.410000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:40.410000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129cf80 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:40.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:40.411000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:40.411000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129d0c0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:40.411000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:40.413000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:40.413000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129d200 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:40.413000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:40.414000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:14:40.414000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129d340 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:40.414000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:40.454687 kubelet[2213]: I0212 22:14:40.454667 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/217f037cf98ceb5ea05958260d88eaf9-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"217f037cf98ceb5ea05958260d88eaf9\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:40.454797 kubelet[2213]: I0212 22:14:40.454786 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/217f037cf98ceb5ea05958260d88eaf9-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"217f037cf98ceb5ea05958260d88eaf9\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:40.454891 kubelet[2213]: I0212 22:14:40.454881 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/217f037cf98ceb5ea05958260d88eaf9-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"217f037cf98ceb5ea05958260d88eaf9\") " pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:40.454973 kubelet[2213]: I0212 22:14:40.454964 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:40.455059 kubelet[2213]: I0212 22:14:40.455040 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:40.455145 kubelet[2213]: I0212 22:14:40.455127 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72ae17a74a2eae76daac6d298477aff0-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"72ae17a74a2eae76daac6d298477aff0\") " pod="kube-system/kube-scheduler-localhost" Feb 12 22:14:40.455288 kubelet[2213]: I0212 22:14:40.455277 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:40.455366 kubelet[2213]: I0212 22:14:40.455356 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:40.455447 kubelet[2213]: I0212 22:14:40.455437 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:41.144786 kubelet[2213]: I0212 22:14:41.144757 2213 apiserver.go:52] "Watching apiserver" Feb 12 22:14:41.153630 kubelet[2213]: I0212 22:14:41.153610 2213 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:14:41.158599 kubelet[2213]: I0212 22:14:41.158579 2213 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:14:41.553715 kubelet[2213]: E0212 22:14:41.553691 2213 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 22:14:41.748239 kubelet[2213]: E0212 22:14:41.748223 2213 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Feb 12 22:14:41.952908 kubelet[2213]: E0212 22:14:41.952889 2213 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 12 22:14:42.155210 kubelet[2213]: I0212 22:14:42.155190 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.154563866 pod.CreationTimestamp="2024-02-12 22:14:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:14:42.151736447 +0000 UTC m=+2.073427976" watchObservedRunningTime="2024-02-12 22:14:42.154563866 +0000 UTC m=+2.076255394" Feb 12 22:14:42.946803 kubelet[2213]: I0212 22:14:42.946783 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.946749817 pod.CreationTimestamp="2024-02-12 22:14:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:14:42.54840415 +0000 UTC m=+2.470095680" watchObservedRunningTime="2024-02-12 22:14:42.946749817 +0000 UTC m=+2.868441350" Feb 12 22:14:44.669488 sudo[1392]: pam_unix(sudo:session): session closed for user root Feb 12 22:14:44.668000 audit[1392]: USER_END pid=1392 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:44.669000 audit[1392]: CRED_DISP pid=1392 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:14:44.679077 sshd[1388]: pam_unix(sshd:session): session closed for user core Feb 12 22:14:44.681000 audit[1388]: USER_END pid=1388 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:44.681000 audit[1388]: CRED_DISP pid=1388 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:14:44.685703 systemd-logind[1142]: Session 9 logged out. Waiting for processes to exit. Feb 12 22:14:44.685880 systemd[1]: sshd@16-139.178.70.100:22-139.178.89.65:47154.service: Deactivated successfully. Feb 12 22:14:44.686292 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 22:14:44.686373 systemd[1]: session-9.scope: Consumed 2.374s CPU time. Feb 12 22:14:44.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-139.178.89.65:47154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:44.686959 systemd-logind[1142]: Removed session 9. Feb 12 22:14:46.574824 kubelet[2213]: I0212 22:14:46.574802 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=6.574764929 pod.CreationTimestamp="2024-02-12 22:14:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:14:42.947054584 +0000 UTC m=+2.868746116" watchObservedRunningTime="2024-02-12 22:14:46.574764929 +0000 UTC m=+6.496456461" Feb 12 22:14:48.539481 systemd[1]: Started sshd@19-139.178.70.100:22-101.42.7.118:37982.service. Feb 12 22:14:48.540588 kernel: kauditd_printk_skb: 357 callbacks suppressed Feb 12 22:14:48.540627 kernel: audit: type=1130 audit(1707776088.538:940): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-101.42.7.118:37982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:48.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-101.42.7.118:37982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:49.468763 sshd[2321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:14:49.468000 audit[2321]: USER_AUTH pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:14:49.473899 kernel: audit: type=1100 audit(1707776089.468:941): pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:14:51.396036 systemd[1]: Started sshd@20-139.178.70.100:22-188.166.160.119:47770.service. Feb 12 22:14:51.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-188.166.160.119:47770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:51.399844 kernel: audit: type=1130 audit(1707776091.395:942): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-188.166.160.119:47770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:51.714619 sshd[2321]: Failed password for root from 101.42.7.118 port 37982 ssh2 Feb 12 22:14:52.286182 sshd[2324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.160.119 user=root Feb 12 22:14:52.285000 audit[2324]: USER_AUTH pid=2324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=188.166.160.119 addr=188.166.160.119 terminal=ssh res=failed' Feb 12 22:14:52.289841 kernel: audit: type=1100 audit(1707776092.285:943): pid=2324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=188.166.160.119 addr=188.166.160.119 terminal=ssh res=failed' Feb 12 22:14:52.360000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6538 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 22:14:52.360000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001401fc0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:52.369193 kernel: audit: type=1400 audit(1707776092.360:944): avc: denied { watch } for pid=2061 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6538 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 22:14:52.369290 kernel: audit: type=1300 audit(1707776092.360:944): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001401fc0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:14:52.360000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:52.372684 kernel: audit: type=1327 audit(1707776092.360:944): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:14:52.984060 kubelet[2213]: I0212 22:14:52.984038 2213 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 22:14:52.984393 env[1161]: time="2024-02-12T22:14:52.984291330Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 22:14:52.984547 kubelet[2213]: I0212 22:14:52.984401 2213 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 22:14:53.053357 sshd[2321]: Received disconnect from 101.42.7.118 port 37982:11: Bye Bye [preauth] Feb 12 22:14:53.053357 sshd[2321]: Disconnected from authenticating user root 101.42.7.118 port 37982 [preauth] Feb 12 22:14:53.054279 systemd[1]: sshd@19-139.178.70.100:22-101.42.7.118:37982.service: Deactivated successfully. Feb 12 22:14:53.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-101.42.7.118:37982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:53.058866 kernel: audit: type=1131 audit(1707776093.053:945): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-101.42.7.118:37982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:53.824672 kubelet[2213]: I0212 22:14:53.824643 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:53.829110 systemd[1]: Created slice kubepods-besteffort-pod6081250f_431a_45b3_a414_102365dcb2bb.slice. Feb 12 22:14:53.841051 kubelet[2213]: I0212 22:14:53.841029 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6081250f-431a-45b3-a414-102365dcb2bb-kube-proxy\") pod \"kube-proxy-28s8k\" (UID: \"6081250f-431a-45b3-a414-102365dcb2bb\") " pod="kube-system/kube-proxy-28s8k" Feb 12 22:14:53.841051 kubelet[2213]: I0212 22:14:53.841053 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6081250f-431a-45b3-a414-102365dcb2bb-xtables-lock\") pod \"kube-proxy-28s8k\" (UID: \"6081250f-431a-45b3-a414-102365dcb2bb\") " pod="kube-system/kube-proxy-28s8k" Feb 12 22:14:53.841179 kubelet[2213]: I0212 22:14:53.841068 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6081250f-431a-45b3-a414-102365dcb2bb-lib-modules\") pod \"kube-proxy-28s8k\" (UID: \"6081250f-431a-45b3-a414-102365dcb2bb\") " pod="kube-system/kube-proxy-28s8k" Feb 12 22:14:53.841179 kubelet[2213]: I0212 22:14:53.841082 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ps7d6\" (UniqueName: \"kubernetes.io/projected/6081250f-431a-45b3-a414-102365dcb2bb-kube-api-access-ps7d6\") pod \"kube-proxy-28s8k\" (UID: \"6081250f-431a-45b3-a414-102365dcb2bb\") " pod="kube-system/kube-proxy-28s8k" Feb 12 22:14:53.942254 kubelet[2213]: I0212 22:14:53.942233 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:53.945315 systemd[1]: Created slice kubepods-besteffort-podb3b402fa_eb85_4517_a9b8_0c365aec3d14.slice. Feb 12 22:14:54.042429 kubelet[2213]: I0212 22:14:54.042408 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b3b402fa-eb85-4517-a9b8-0c365aec3d14-var-lib-calico\") pod \"tigera-operator-cfc98749c-vd9nl\" (UID: \"b3b402fa-eb85-4517-a9b8-0c365aec3d14\") " pod="tigera-operator/tigera-operator-cfc98749c-vd9nl" Feb 12 22:14:54.042722 kubelet[2213]: I0212 22:14:54.042712 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7xrs4\" (UniqueName: \"kubernetes.io/projected/b3b402fa-eb85-4517-a9b8-0c365aec3d14-kube-api-access-7xrs4\") pod \"tigera-operator-cfc98749c-vd9nl\" (UID: \"b3b402fa-eb85-4517-a9b8-0c365aec3d14\") " pod="tigera-operator/tigera-operator-cfc98749c-vd9nl" Feb 12 22:14:54.147004 env[1161]: time="2024-02-12T22:14:54.146589450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-28s8k,Uid:6081250f-431a-45b3-a414-102365dcb2bb,Namespace:kube-system,Attempt:0,}" Feb 12 22:14:54.178522 env[1161]: time="2024-02-12T22:14:54.178391903Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:54.178522 env[1161]: time="2024-02-12T22:14:54.178488431Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:54.178760 env[1161]: time="2024-02-12T22:14:54.178498818Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:54.178760 env[1161]: time="2024-02-12T22:14:54.178709207Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40a6cf424b4aa10128b341b70bf16bbc37fc64db72b85d7ac6739c346ca52ae6 pid=2336 runtime=io.containerd.runc.v2 Feb 12 22:14:54.192910 systemd[1]: Started cri-containerd-40a6cf424b4aa10128b341b70bf16bbc37fc64db72b85d7ac6739c346ca52ae6.scope. Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.208712 kernel: audit: type=1400 audit(1707776094.202:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.208748 kernel: audit: type=1400 audit(1707776094.202:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.208858 kernel: audit: type=1400 audit(1707776094.202:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.218000 kernel: audit: type=1400 audit(1707776094.202:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.218043 kernel: audit: type=1400 audit(1707776094.202:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.221166 kernel: audit: type=1400 audit(1707776094.202:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.221199 kernel: audit: type=1400 audit(1707776094.202:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.226168 kernel: audit: type=1400 audit(1707776094.202:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.228643 kernel: audit: type=1400 audit(1707776094.202:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.231116 kernel: audit: type=1400 audit(1707776094.203:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.231253 env[1161]: time="2024-02-12T22:14:54.231233263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-28s8k,Uid:6081250f-431a-45b3-a414-102365dcb2bb,Namespace:kube-system,Attempt:0,} returns sandbox id \"40a6cf424b4aa10128b341b70bf16bbc37fc64db72b85d7ac6739c346ca52ae6\"" Feb 12 22:14:54.203000 audit: BPF prog-id=112 op=LOAD Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2336 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613663663432346234616131303132386233343162373062663136 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2336 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613663663432346234616131303132386233343162373062663136 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.203000 audit: BPF prog-id=113 op=LOAD Feb 12 22:14:54.203000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024c70 items=0 ppid=2336 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613663663432346234616131303132386233343162373062663136 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.207000 audit: BPF prog-id=114 op=LOAD Feb 12 22:14:54.207000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024cb8 items=0 ppid=2336 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613663663432346234616131303132386233343162373062663136 Feb 12 22:14:54.210000 audit: BPF prog-id=114 op=UNLOAD Feb 12 22:14:54.210000 audit: BPF prog-id=113 op=UNLOAD Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.210000 audit: BPF prog-id=115 op=LOAD Feb 12 22:14:54.210000 audit[2348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000250c8 items=0 ppid=2336 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613663663432346234616131303132386233343162373062663136 Feb 12 22:14:54.234724 env[1161]: time="2024-02-12T22:14:54.233875777Z" level=info msg="CreateContainer within sandbox \"40a6cf424b4aa10128b341b70bf16bbc37fc64db72b85d7ac6739c346ca52ae6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 22:14:54.241077 env[1161]: time="2024-02-12T22:14:54.241048839Z" level=info msg="CreateContainer within sandbox \"40a6cf424b4aa10128b341b70bf16bbc37fc64db72b85d7ac6739c346ca52ae6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8757b9ce45d178df34899667c9a2cbd986adf36beedd2832cdba6416fbefefab\"" Feb 12 22:14:54.242497 env[1161]: time="2024-02-12T22:14:54.242481664Z" level=info msg="StartContainer for \"8757b9ce45d178df34899667c9a2cbd986adf36beedd2832cdba6416fbefefab\"" Feb 12 22:14:54.251511 env[1161]: time="2024-02-12T22:14:54.251489351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-vd9nl,Uid:b3b402fa-eb85-4517-a9b8-0c365aec3d14,Namespace:tigera-operator,Attempt:0,}" Feb 12 22:14:54.253311 systemd[1]: Started cri-containerd-8757b9ce45d178df34899667c9a2cbd986adf36beedd2832cdba6416fbefefab.scope. Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f9f2ab3fcc8 items=0 ppid=2336 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353762396365343564313738646633343839393636376339613263 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.266000 audit: BPF prog-id=116 op=LOAD Feb 12 22:14:54.266000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00027bc58 items=0 ppid=2336 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353762396365343564313738646633343839393636376339613263 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit: BPF prog-id=117 op=LOAD Feb 12 22:14:54.267000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00027bca8 items=0 ppid=2336 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353762396365343564313738646633343839393636376339613263 Feb 12 22:14:54.267000 audit: BPF prog-id=117 op=UNLOAD Feb 12 22:14:54.267000 audit: BPF prog-id=116 op=UNLOAD Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.267000 audit: BPF prog-id=118 op=LOAD Feb 12 22:14:54.267000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00027bd38 items=0 ppid=2336 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353762396365343564313738646633343839393636376339613263 Feb 12 22:14:54.272566 env[1161]: time="2024-02-12T22:14:54.272520982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:54.272699 env[1161]: time="2024-02-12T22:14:54.272665873Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:54.272778 env[1161]: time="2024-02-12T22:14:54.272764821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:54.273075 env[1161]: time="2024-02-12T22:14:54.273053621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/410f71d3414e814ab95380a177adff351b085a1e52b4936e06036a7c6259ea0f pid=2402 runtime=io.containerd.runc.v2 Feb 12 22:14:54.275924 sshd[2324]: Failed password for root from 188.166.160.119 port 47770 ssh2 Feb 12 22:14:54.283427 systemd[1]: Started cri-containerd-410f71d3414e814ab95380a177adff351b085a1e52b4936e06036a7c6259ea0f.scope. Feb 12 22:14:54.286853 env[1161]: time="2024-02-12T22:14:54.286656898Z" level=info msg="StartContainer for \"8757b9ce45d178df34899667c9a2cbd986adf36beedd2832cdba6416fbefefab\" returns successfully" Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.293000 audit: BPF prog-id=119 op=LOAD Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2402 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306637316433343134653831346162393533383061313737616466 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2402 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306637316433343134653831346162393533383061313737616466 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.294000 audit: BPF prog-id=120 op=LOAD Feb 12 22:14:54.294000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000290450 items=0 ppid=2402 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306637316433343134653831346162393533383061313737616466 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit: BPF prog-id=121 op=LOAD Feb 12 22:14:54.295000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000290498 items=0 ppid=2402 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306637316433343134653831346162393533383061313737616466 Feb 12 22:14:54.295000 audit: BPF prog-id=121 op=UNLOAD Feb 12 22:14:54.295000 audit: BPF prog-id=120 op=UNLOAD Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:54.295000 audit: BPF prog-id=122 op=LOAD Feb 12 22:14:54.295000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002908a8 items=0 ppid=2402 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306637316433343134653831346162393533383061313737616466 Feb 12 22:14:54.317012 env[1161]: time="2024-02-12T22:14:54.316990257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-vd9nl,Uid:b3b402fa-eb85-4517-a9b8-0c365aec3d14,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"410f71d3414e814ab95380a177adff351b085a1e52b4936e06036a7c6259ea0f\"" Feb 12 22:14:54.322027 env[1161]: time="2024-02-12T22:14:54.322013012Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 22:14:54.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-51.77.245.237:39312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:54.517873 systemd[1]: Started sshd@21-139.178.70.100:22-51.77.245.237:39312.service. Feb 12 22:14:54.675000 audit[2472]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.675000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1cc70870 a2=0 a3=7ffd1cc7085c items=0 ppid=2389 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:14:54.676000 audit[2473]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.676000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd1997150 a2=0 a3=7fffd199713c items=0 ppid=2389 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:14:54.676000 audit[2474]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.676000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd009ce080 a2=0 a3=7ffd009ce06c items=0 ppid=2389 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:14:54.678000 audit[2475]: NETFILTER_CFG table=mangle:62 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.678000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccee1b900 a2=0 a3=7ffccee1b8ec items=0 ppid=2389 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:14:54.679000 audit[2476]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.679000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb492f870 a2=0 a3=7ffeb492f85c items=0 ppid=2389 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:14:54.680000 audit[2477]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.680000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe348f7620 a2=0 a3=7ffe348f760c items=0 ppid=2389 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:14:54.781000 audit[2478]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.781000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe2d510600 a2=0 a3=7ffe2d5105ec items=0 ppid=2389 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:14:54.785000 audit[2480]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.785000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff16ada350 a2=0 a3=7fff16ada33c items=0 ppid=2389 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 22:14:54.788000 audit[2483]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.788000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff493a7bd0 a2=0 a3=7fff493a7bbc items=0 ppid=2389 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 22:14:54.789000 audit[2484]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.789000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc906ddc60 a2=0 a3=7ffc906ddc4c items=0 ppid=2389 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:14:54.791000 audit[2486]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.791000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeeb4c7d40 a2=0 a3=7ffeeb4c7d2c items=0 ppid=2389 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:14:54.792000 audit[2487]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.792000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe88470840 a2=0 a3=7ffe8847082c items=0 ppid=2389 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:14:54.794000 audit[2489]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.794000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf3e69130 a2=0 a3=7ffdf3e6911c items=0 ppid=2389 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:14:54.797000 audit[2492]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.797000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd9c3a220 a2=0 a3=7ffdd9c3a20c items=0 ppid=2389 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 22:14:54.798000 audit[2493]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.798000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc81c56c00 a2=0 a3=7ffc81c56bec items=0 ppid=2389 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:14:54.800000 audit[2495]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.800000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd327e9b80 a2=0 a3=7ffd327e9b6c items=0 ppid=2389 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:14:54.801000 audit[2496]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.801000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde7a25f50 a2=0 a3=7ffde7a25f3c items=0 ppid=2389 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:14:54.803000 audit[2498]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.803000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe57855320 a2=0 a3=7ffe5785530c items=0 ppid=2389 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:14:54.807000 audit[2502]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.807000 audit[2502]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd57cf2e0 a2=0 a3=7ffcd57cf2cc items=0 ppid=2389 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:14:54.810000 audit[2505]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.810000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffebe72d50 a2=0 a3=7fffebe72d3c items=0 ppid=2389 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:14:54.811000 audit[2506]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.811000 audit[2506]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe4b4c9510 a2=0 a3=7ffe4b4c94fc items=0 ppid=2389 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:14:54.813000 audit[2508]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.813000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdc1127410 a2=0 a3=7ffdc11273fc items=0 ppid=2389 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:14:54.815000 audit[2511]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2511 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:14:54.815000 audit[2511]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd29810db0 a2=0 a3=7ffd29810d9c items=0 ppid=2389 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:14:54.826000 audit[2515]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:54.826000 audit[2515]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe8f74fb20 a2=0 a3=7ffe8f74fb0c items=0 ppid=2389 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:54.830000 audit[2515]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:54.830000 audit[2515]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe8f74fb20 a2=0 a3=7ffe8f74fb0c items=0 ppid=2389 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:54.831000 audit[2519]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2519 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.831000 audit[2519]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd929953b0 a2=0 a3=7ffd9299539c items=0 ppid=2389 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:14:54.832000 audit[2521]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2521 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.832000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8150ddb0 a2=0 a3=7ffe8150dd9c items=0 ppid=2389 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:14:54.836000 audit[2524]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2524 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.836000 audit[2524]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdff865d40 a2=0 a3=7ffdff865d2c items=0 ppid=2389 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:14:54.837000 audit[2525]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2525 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.837000 audit[2525]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff99bbf80 a2=0 a3=7ffff99bbf6c items=0 ppid=2389 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:14:54.838000 audit[2527]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2527 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.838000 audit[2527]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe9a77df0 a2=0 a3=7fffe9a77ddc items=0 ppid=2389 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:14:54.839000 audit[2528]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.839000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeafec9ff0 a2=0 a3=7ffeafec9fdc items=0 ppid=2389 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:14:54.841000 audit[2530]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.841000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffef43cc9b0 a2=0 a3=7ffef43cc99c items=0 ppid=2389 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 22:14:54.843000 audit[2533]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.843000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc588870f0 a2=0 a3=7ffc588870dc items=0 ppid=2389 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:14:54.844000 audit[2534]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2534 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.844000 audit[2534]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd36e0f380 a2=0 a3=7ffd36e0f36c items=0 ppid=2389 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:14:54.845000 audit[2536]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.845000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4f977ad0 a2=0 a3=7ffc4f977abc items=0 ppid=2389 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:14:54.846000 audit[2537]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2537 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.846000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd045ca80 a2=0 a3=7ffcd045ca6c items=0 ppid=2389 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:14:54.848000 audit[2539]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2539 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.848000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff358a92f0 a2=0 a3=7fff358a92dc items=0 ppid=2389 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:14:54.850000 audit[2542]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.850000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3a3e4350 a2=0 a3=7ffe3a3e433c items=0 ppid=2389 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:14:54.852000 audit[2545]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.852000 audit[2545]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff42ae63a0 a2=0 a3=7fff42ae638c items=0 ppid=2389 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 22:14:54.853000 audit[2546]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.853000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeebfcd7e0 a2=0 a3=7ffeebfcd7cc items=0 ppid=2389 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:14:54.855000 audit[2548]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=2548 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.855000 audit[2548]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe7c19a110 a2=0 a3=7ffe7c19a0fc items=0 ppid=2389 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:14:54.857000 audit[2551]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=2551 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:14:54.857000 audit[2551]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffec59c8f0 a2=0 a3=7fffec59c8dc items=0 ppid=2389 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:14:54.860000 audit[2555]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=2555 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:14:54.860000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc48c06c70 a2=0 a3=7ffc48c06c5c items=0 ppid=2389 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.860000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:54.861000 audit[2555]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=2555 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:14:54.861000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc48c06c70 a2=0 a3=7ffc48c06c5c items=0 ppid=2389 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:54.861000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:55.248188 kubelet[2213]: I0212 22:14:55.248082 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-28s8k" podStartSLOduration=2.24806215 pod.CreationTimestamp="2024-02-12 22:14:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:14:55.247897264 +0000 UTC m=+15.169588791" watchObservedRunningTime="2024-02-12 22:14:55.24806215 +0000 UTC m=+15.169753680" Feb 12 22:14:55.404000 audit[2448]: USER_AUTH pid=2448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=51.77.245.237 addr=51.77.245.237 terminal=ssh res=failed' Feb 12 22:14:55.405504 sshd[2448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.237 user=root Feb 12 22:14:55.483591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2610637304.mount: Deactivated successfully. Feb 12 22:14:55.873055 sshd[2324]: Received disconnect from 188.166.160.119 port 47770:11: Bye Bye [preauth] Feb 12 22:14:55.873055 sshd[2324]: Disconnected from authenticating user root 188.166.160.119 port 47770 [preauth] Feb 12 22:14:55.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-188.166.160.119:47770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:55.873834 systemd[1]: sshd@20-139.178.70.100:22-188.166.160.119:47770.service: Deactivated successfully. Feb 12 22:14:56.359960 env[1161]: time="2024-02-12T22:14:56.359935198Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:56.360473 env[1161]: time="2024-02-12T22:14:56.360459135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:56.361408 env[1161]: time="2024-02-12T22:14:56.361394041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:56.362364 env[1161]: time="2024-02-12T22:14:56.362349527Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:14:56.362815 env[1161]: time="2024-02-12T22:14:56.362800502Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 22:14:56.364962 env[1161]: time="2024-02-12T22:14:56.364943257Z" level=info msg="CreateContainer within sandbox \"410f71d3414e814ab95380a177adff351b085a1e52b4936e06036a7c6259ea0f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 22:14:56.369979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount441644833.mount: Deactivated successfully. Feb 12 22:14:56.372597 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3904641259.mount: Deactivated successfully. Feb 12 22:14:56.381157 env[1161]: time="2024-02-12T22:14:56.381136122Z" level=info msg="CreateContainer within sandbox \"410f71d3414e814ab95380a177adff351b085a1e52b4936e06036a7c6259ea0f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"af5635435370bc6e8b0d1f540ef5b0906c88202d69c2d5c20825e7bbf82356fa\"" Feb 12 22:14:56.382342 env[1161]: time="2024-02-12T22:14:56.382305912Z" level=info msg="StartContainer for \"af5635435370bc6e8b0d1f540ef5b0906c88202d69c2d5c20825e7bbf82356fa\"" Feb 12 22:14:56.395660 systemd[1]: Started cri-containerd-af5635435370bc6e8b0d1f540ef5b0906c88202d69c2d5c20825e7bbf82356fa.scope. Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit: BPF prog-id=123 op=LOAD Feb 12 22:14:56.405000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2402 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:56.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353633353433353337306263366538623064316635343065663562 Feb 12 22:14:56.405000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.405000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2402 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:56.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353633353433353337306263366538623064316635343065663562 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit: BPF prog-id=124 op=LOAD Feb 12 22:14:56.406000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030a7f0 items=0 ppid=2402 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:56.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353633353433353337306263366538623064316635343065663562 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.406000 audit: BPF prog-id=125 op=LOAD Feb 12 22:14:56.406000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030a838 items=0 ppid=2402 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:56.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353633353433353337306263366538623064316635343065663562 Feb 12 22:14:56.407000 audit: BPF prog-id=125 op=UNLOAD Feb 12 22:14:56.407000 audit: BPF prog-id=124 op=UNLOAD Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:56.407000 audit: BPF prog-id=126 op=LOAD Feb 12 22:14:56.407000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030ac48 items=0 ppid=2402 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:56.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353633353433353337306263366538623064316635343065663562 Feb 12 22:14:56.416686 env[1161]: time="2024-02-12T22:14:56.416658907Z" level=info msg="StartContainer for \"af5635435370bc6e8b0d1f540ef5b0906c88202d69c2d5c20825e7bbf82356fa\" returns successfully" Feb 12 22:14:58.120000 audit[2622]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:58.120000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe0a4e1180 a2=0 a3=7ffe0a4e116c items=0 ppid=2389 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:58.120000 audit[2622]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:58.120000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe0a4e1180 a2=0 a3=7ffe0a4e116c items=0 ppid=2389 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:58.142909 sshd[2448]: Failed password for root from 51.77.245.237 port 39312 ssh2 Feb 12 22:14:58.143000 audit[2648]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=2648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:58.143000 audit[2648]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe46cb3770 a2=0 a3=7ffe46cb375c items=0 ppid=2389 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:58.144000 audit[2648]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:58.144000 audit[2648]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe46cb3770 a2=0 a3=7ffe46cb375c items=0 ppid=2389 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:58.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-152.32.209.108:57646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:58.178131 systemd[1]: Started sshd@22-139.178.70.100:22-152.32.209.108:57646.service. Feb 12 22:14:58.222914 kubelet[2213]: I0212 22:14:58.222884 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-vd9nl" podStartSLOduration=-9.223372031631918e+09 pod.CreationTimestamp="2024-02-12 22:14:53 +0000 UTC" firstStartedPulling="2024-02-12 22:14:54.317574873 +0000 UTC m=+14.239266400" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:14:57.250769155 +0000 UTC m=+17.172460693" watchObservedRunningTime="2024-02-12 22:14:58.222857819 +0000 UTC m=+18.144549349" Feb 12 22:14:58.223272 kubelet[2213]: I0212 22:14:58.223263 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:58.226600 systemd[1]: Created slice kubepods-besteffort-podd2c2516f_c714_479e_aabe_056481b9f821.slice. Feb 12 22:14:58.263504 kubelet[2213]: I0212 22:14:58.263486 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:58.264958 kubelet[2213]: I0212 22:14:58.264940 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2c2516f-c714-479e-aabe-056481b9f821-tigera-ca-bundle\") pod \"calico-typha-759f9bb654-j5hhn\" (UID: \"d2c2516f-c714-479e-aabe-056481b9f821\") " pod="calico-system/calico-typha-759f9bb654-j5hhn" Feb 12 22:14:58.265029 kubelet[2213]: I0212 22:14:58.264963 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d2c2516f-c714-479e-aabe-056481b9f821-typha-certs\") pod \"calico-typha-759f9bb654-j5hhn\" (UID: \"d2c2516f-c714-479e-aabe-056481b9f821\") " pod="calico-system/calico-typha-759f9bb654-j5hhn" Feb 12 22:14:58.265029 kubelet[2213]: I0212 22:14:58.264977 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xfz4d\" (UniqueName: \"kubernetes.io/projected/d2c2516f-c714-479e-aabe-056481b9f821-kube-api-access-xfz4d\") pod \"calico-typha-759f9bb654-j5hhn\" (UID: \"d2c2516f-c714-479e-aabe-056481b9f821\") " pod="calico-system/calico-typha-759f9bb654-j5hhn" Feb 12 22:14:58.266870 systemd[1]: Created slice kubepods-besteffort-pod8efe74c7_b08a_4933_833a_ad04cf90bb79.slice. Feb 12 22:14:58.366076 kubelet[2213]: I0212 22:14:58.366049 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8efe74c7-b08a-4933-833a-ad04cf90bb79-tigera-ca-bundle\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366076 kubelet[2213]: I0212 22:14:58.366076 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-cni-log-dir\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366229 kubelet[2213]: I0212 22:14:58.366096 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-lib-modules\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366229 kubelet[2213]: I0212 22:14:58.366123 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8efe74c7-b08a-4933-833a-ad04cf90bb79-node-certs\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366229 kubelet[2213]: I0212 22:14:58.366145 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-xtables-lock\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366229 kubelet[2213]: I0212 22:14:58.366157 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-cni-bin-dir\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366229 kubelet[2213]: I0212 22:14:58.366169 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s74hs\" (UniqueName: \"kubernetes.io/projected/8efe74c7-b08a-4933-833a-ad04cf90bb79-kube-api-access-s74hs\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366390 kubelet[2213]: I0212 22:14:58.366180 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-policysync\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366390 kubelet[2213]: I0212 22:14:58.366192 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-var-lib-calico\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366390 kubelet[2213]: I0212 22:14:58.366204 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-flexvol-driver-host\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366390 kubelet[2213]: I0212 22:14:58.366216 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-var-run-calico\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.366390 kubelet[2213]: I0212 22:14:58.366227 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8efe74c7-b08a-4933-833a-ad04cf90bb79-cni-net-dir\") pod \"calico-node-stghk\" (UID: \"8efe74c7-b08a-4933-833a-ad04cf90bb79\") " pod="calico-system/calico-node-stghk" Feb 12 22:14:58.382292 kubelet[2213]: I0212 22:14:58.382231 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:14:58.383369 kubelet[2213]: E0212 22:14:58.382387 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:14:58.467019 kubelet[2213]: I0212 22:14:58.466993 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b1d4a8b2-7626-4b49-927f-6d4573ba6436-registration-dir\") pod \"csi-node-driver-hsbwn\" (UID: \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\") " pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:14:58.467113 kubelet[2213]: I0212 22:14:58.467045 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b1d4a8b2-7626-4b49-927f-6d4573ba6436-kubelet-dir\") pod \"csi-node-driver-hsbwn\" (UID: \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\") " pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:14:58.467113 kubelet[2213]: I0212 22:14:58.467086 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b1d4a8b2-7626-4b49-927f-6d4573ba6436-socket-dir\") pod \"csi-node-driver-hsbwn\" (UID: \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\") " pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:14:58.467113 kubelet[2213]: I0212 22:14:58.467099 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wgzvw\" (UniqueName: \"kubernetes.io/projected/b1d4a8b2-7626-4b49-927f-6d4573ba6436-kube-api-access-wgzvw\") pod \"csi-node-driver-hsbwn\" (UID: \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\") " pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:14:58.467180 kubelet[2213]: I0212 22:14:58.467124 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b1d4a8b2-7626-4b49-927f-6d4573ba6436-varrun\") pod \"csi-node-driver-hsbwn\" (UID: \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\") " pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:14:58.467743 kubelet[2213]: E0212 22:14:58.467734 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.467803 kubelet[2213]: W0212 22:14:58.467794 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.467883 kubelet[2213]: E0212 22:14:58.467876 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.468025 kubelet[2213]: E0212 22:14:58.468019 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.468079 kubelet[2213]: W0212 22:14:58.468071 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.468130 kubelet[2213]: E0212 22:14:58.468123 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.468212 kubelet[2213]: E0212 22:14:58.468203 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.468212 kubelet[2213]: W0212 22:14:58.468210 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.468276 kubelet[2213]: E0212 22:14:58.468218 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.468300 kubelet[2213]: E0212 22:14:58.468285 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.468300 kubelet[2213]: W0212 22:14:58.468289 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.468300 kubelet[2213]: E0212 22:14:58.468295 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.468387 kubelet[2213]: E0212 22:14:58.468380 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.468387 kubelet[2213]: W0212 22:14:58.468385 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.468441 kubelet[2213]: E0212 22:14:58.468391 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.474136 kubelet[2213]: E0212 22:14:58.474122 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.474136 kubelet[2213]: W0212 22:14:58.474132 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.474222 kubelet[2213]: E0212 22:14:58.474141 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.528809 env[1161]: time="2024-02-12T22:14:58.528505193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-759f9bb654-j5hhn,Uid:d2c2516f-c714-479e-aabe-056481b9f821,Namespace:calico-system,Attempt:0,}" Feb 12 22:14:58.538528 env[1161]: time="2024-02-12T22:14:58.538485040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:58.538634 env[1161]: time="2024-02-12T22:14:58.538514665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:58.538634 env[1161]: time="2024-02-12T22:14:58.538538723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:58.542136 env[1161]: time="2024-02-12T22:14:58.538774971Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/737dbc73b3ba5712366ea4099a3f5cb7a0e9b6facee2954a1b21e792411a7959 pid=2668 runtime=io.containerd.runc.v2 Feb 12 22:14:58.549725 systemd[1]: Started cri-containerd-737dbc73b3ba5712366ea4099a3f5cb7a0e9b6facee2954a1b21e792411a7959.scope. Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit: BPF prog-id=127 op=LOAD Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2668 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733376462633733623362613537313233363665613430393961336635 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2668 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733376462633733623362613537313233363665613430393961336635 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.565000 audit: BPF prog-id=128 op=LOAD Feb 12 22:14:58.565000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e1a10 items=0 ppid=2668 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733376462633733623362613537313233363665613430393961336635 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit: BPF prog-id=129 op=LOAD Feb 12 22:14:58.566000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e1a58 items=0 ppid=2668 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733376462633733623362613537313233363665613430393961336635 Feb 12 22:14:58.566000 audit: BPF prog-id=129 op=UNLOAD Feb 12 22:14:58.566000 audit: BPF prog-id=128 op=UNLOAD Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.566000 audit: BPF prog-id=130 op=LOAD Feb 12 22:14:58.566000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e1e68 items=0 ppid=2668 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733376462633733623362613537313233363665613430393961336635 Feb 12 22:14:58.568215 kubelet[2213]: E0212 22:14:58.567659 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.568215 kubelet[2213]: W0212 22:14:58.567668 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.568215 kubelet[2213]: E0212 22:14:58.567681 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.568287 kubelet[2213]: E0212 22:14:58.568230 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.568287 kubelet[2213]: W0212 22:14:58.568235 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.568287 kubelet[2213]: E0212 22:14:58.568245 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.568422 kubelet[2213]: E0212 22:14:58.568409 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.568422 kubelet[2213]: W0212 22:14:58.568418 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.568473 kubelet[2213]: E0212 22:14:58.568426 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.568903 kubelet[2213]: E0212 22:14:58.568877 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.568903 kubelet[2213]: W0212 22:14:58.568885 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.568903 kubelet[2213]: E0212 22:14:58.568895 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569070 kubelet[2213]: E0212 22:14:58.569026 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569070 kubelet[2213]: W0212 22:14:58.569032 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569070 kubelet[2213]: E0212 22:14:58.569039 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569202 kubelet[2213]: E0212 22:14:58.569192 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569202 kubelet[2213]: W0212 22:14:58.569199 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569259 kubelet[2213]: E0212 22:14:58.569207 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569321 kubelet[2213]: E0212 22:14:58.569311 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569321 kubelet[2213]: W0212 22:14:58.569317 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569375 kubelet[2213]: E0212 22:14:58.569358 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569474 kubelet[2213]: E0212 22:14:58.569462 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569474 kubelet[2213]: W0212 22:14:58.569471 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569528 kubelet[2213]: E0212 22:14:58.569511 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569601 kubelet[2213]: E0212 22:14:58.569590 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569632 kubelet[2213]: W0212 22:14:58.569603 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569632 kubelet[2213]: E0212 22:14:58.569611 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569740 kubelet[2213]: E0212 22:14:58.569729 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569740 kubelet[2213]: W0212 22:14:58.569737 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569795 kubelet[2213]: E0212 22:14:58.569773 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.569882 kubelet[2213]: E0212 22:14:58.569872 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.569882 kubelet[2213]: W0212 22:14:58.569879 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.569940 kubelet[2213]: E0212 22:14:58.569916 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.570288 kubelet[2213]: E0212 22:14:58.570276 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.570288 kubelet[2213]: W0212 22:14:58.570284 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.570347 kubelet[2213]: E0212 22:14:58.570295 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.570432 kubelet[2213]: E0212 22:14:58.570422 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.570432 kubelet[2213]: W0212 22:14:58.570429 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.570490 kubelet[2213]: E0212 22:14:58.570466 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.570581 kubelet[2213]: E0212 22:14:58.570572 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.570581 kubelet[2213]: W0212 22:14:58.570578 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.570631 kubelet[2213]: E0212 22:14:58.570618 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.570710 kubelet[2213]: E0212 22:14:58.570701 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.570710 kubelet[2213]: W0212 22:14:58.570707 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.570759 kubelet[2213]: E0212 22:14:58.570745 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.570859 kubelet[2213]: E0212 22:14:58.570849 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.570859 kubelet[2213]: W0212 22:14:58.570856 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.570909 kubelet[2213]: E0212 22:14:58.570864 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.571017 kubelet[2213]: E0212 22:14:58.571007 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.571017 kubelet[2213]: W0212 22:14:58.571013 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.571066 kubelet[2213]: E0212 22:14:58.571049 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.571197 kubelet[2213]: E0212 22:14:58.571188 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.571197 kubelet[2213]: W0212 22:14:58.571194 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.571244 kubelet[2213]: E0212 22:14:58.571231 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.571316 kubelet[2213]: E0212 22:14:58.571308 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.571316 kubelet[2213]: W0212 22:14:58.571315 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.571364 kubelet[2213]: E0212 22:14:58.571328 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.571503 kubelet[2213]: E0212 22:14:58.571495 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.571503 kubelet[2213]: W0212 22:14:58.571501 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.571564 kubelet[2213]: E0212 22:14:58.571509 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.571865 kubelet[2213]: E0212 22:14:58.571856 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.571865 kubelet[2213]: W0212 22:14:58.571862 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.571928 kubelet[2213]: E0212 22:14:58.571870 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.572057 kubelet[2213]: E0212 22:14:58.572049 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.572057 kubelet[2213]: W0212 22:14:58.572055 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.572119 kubelet[2213]: E0212 22:14:58.572063 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.573028 kubelet[2213]: E0212 22:14:58.573019 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.573028 kubelet[2213]: W0212 22:14:58.573025 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.573096 kubelet[2213]: E0212 22:14:58.573032 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.573849 kubelet[2213]: E0212 22:14:58.573839 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.573849 kubelet[2213]: W0212 22:14:58.573846 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.573898 kubelet[2213]: E0212 22:14:58.573853 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.573999 kubelet[2213]: E0212 22:14:58.573985 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.573999 kubelet[2213]: W0212 22:14:58.573995 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.574055 kubelet[2213]: E0212 22:14:58.574002 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.574155 kubelet[2213]: E0212 22:14:58.574143 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.574155 kubelet[2213]: W0212 22:14:58.574152 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.574211 kubelet[2213]: E0212 22:14:58.574159 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.593089 env[1161]: time="2024-02-12T22:14:58.593063470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-759f9bb654-j5hhn,Uid:d2c2516f-c714-479e-aabe-056481b9f821,Namespace:calico-system,Attempt:0,} returns sandbox id \"737dbc73b3ba5712366ea4099a3f5cb7a0e9b6facee2954a1b21e792411a7959\"" Feb 12 22:14:58.594033 env[1161]: time="2024-02-12T22:14:58.594011001Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 22:14:58.669759 kubelet[2213]: E0212 22:14:58.669739 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.669759 kubelet[2213]: W0212 22:14:58.669752 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.669759 kubelet[2213]: E0212 22:14:58.669765 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.669984 kubelet[2213]: E0212 22:14:58.669973 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.669984 kubelet[2213]: W0212 22:14:58.669981 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.670031 kubelet[2213]: E0212 22:14:58.669987 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.770928 kubelet[2213]: E0212 22:14:58.770874 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.770928 kubelet[2213]: W0212 22:14:58.770888 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.770928 kubelet[2213]: E0212 22:14:58.770910 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.771056 kubelet[2213]: E0212 22:14:58.771015 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.771056 kubelet[2213]: W0212 22:14:58.771019 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.771056 kubelet[2213]: E0212 22:14:58.771025 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.829323 kubelet[2213]: E0212 22:14:58.829304 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.829323 kubelet[2213]: W0212 22:14:58.829315 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.829419 kubelet[2213]: E0212 22:14:58.829332 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.868913 env[1161]: time="2024-02-12T22:14:58.868883293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-stghk,Uid:8efe74c7-b08a-4933-833a-ad04cf90bb79,Namespace:calico-system,Attempt:0,}" Feb 12 22:14:58.872464 kubelet[2213]: E0212 22:14:58.872452 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.872464 kubelet[2213]: W0212 22:14:58.872461 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.872534 kubelet[2213]: E0212 22:14:58.872472 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.875603 env[1161]: time="2024-02-12T22:14:58.875557717Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:14:58.875651 env[1161]: time="2024-02-12T22:14:58.875609549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:14:58.875651 env[1161]: time="2024-02-12T22:14:58.875624556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:14:58.875754 env[1161]: time="2024-02-12T22:14:58.875732367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c pid=2742 runtime=io.containerd.runc.v2 Feb 12 22:14:58.882510 systemd[1]: Started cri-containerd-1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c.scope. Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit: BPF prog-id=131 op=LOAD Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2742 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383263623838323338646330626162633839656438356237306261 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2742 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383263623838323338646330626162633839656438356237306261 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit: BPF prog-id=132 op=LOAD Feb 12 22:14:58.890000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003b8000 items=0 ppid=2742 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383263623838323338646330626162633839656438356237306261 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit: BPF prog-id=133 op=LOAD Feb 12 22:14:58.890000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003b8048 items=0 ppid=2742 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383263623838323338646330626162633839656438356237306261 Feb 12 22:14:58.890000 audit: BPF prog-id=133 op=UNLOAD Feb 12 22:14:58.890000 audit: BPF prog-id=132 op=UNLOAD Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:14:58.890000 audit: BPF prog-id=134 op=LOAD Feb 12 22:14:58.890000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b8458 items=0 ppid=2742 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:58.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383263623838323338646330626162633839656438356237306261 Feb 12 22:14:58.900951 env[1161]: time="2024-02-12T22:14:58.900200584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-stghk,Uid:8efe74c7-b08a-4933-833a-ad04cf90bb79,Namespace:calico-system,Attempt:0,} returns sandbox id \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\"" Feb 12 22:14:58.972910 kubelet[2213]: E0212 22:14:58.972794 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:58.972910 kubelet[2213]: W0212 22:14:58.972806 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:58.972910 kubelet[2213]: E0212 22:14:58.972819 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:58.988942 sshd[2448]: Received disconnect from 51.77.245.237 port 39312:11: Bye Bye [preauth] Feb 12 22:14:58.988942 sshd[2448]: Disconnected from authenticating user root 51.77.245.237 port 39312 [preauth] Feb 12 22:14:58.989650 systemd[1]: sshd@21-139.178.70.100:22-51.77.245.237:39312.service: Deactivated successfully. Feb 12 22:14:58.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-51.77.245.237:39312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:14:59.029932 kubelet[2213]: E0212 22:14:59.029914 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:14:59.030028 kubelet[2213]: W0212 22:14:59.030018 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:14:59.030089 kubelet[2213]: E0212 22:14:59.030077 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:14:59.091000 audit[2650]: USER_AUTH pid=2650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=152.32.209.108 addr=152.32.209.108 terminal=ssh res=failed' Feb 12 22:14:59.091932 sshd[2650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.209.108 user=root Feb 12 22:14:59.174000 audit[2807]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:59.174000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffc9c6811c0 a2=0 a3=7ffc9c6811ac items=0 ppid=2389 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:59.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:59.175000 audit[2807]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:14:59.175000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc9c6811c0 a2=0 a3=7ffc9c6811ac items=0 ppid=2389 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:14:59.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:14:59.989652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount379853172.mount: Deactivated successfully. Feb 12 22:15:00.209604 kubelet[2213]: E0212 22:15:00.209581 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:00.295232 systemd[1]: Started sshd@23-139.178.70.100:22-213.74.115.162:60640.service. Feb 12 22:15:00.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-213.74.115.162:60640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:00.300844 kernel: kauditd_printk_skb: 474 callbacks suppressed Feb 12 22:15:00.300912 kernel: audit: type=1130 audit(1707776100.294:1098): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-213.74.115.162:60640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:01.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.100:22-130.61.232.86:57934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:01.262834 systemd[1]: Started sshd@24-139.178.70.100:22-130.61.232.86:57934.service. Feb 12 22:15:01.265888 kernel: audit: type=1130 audit(1707776101.262:1099): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.100:22-130.61.232.86:57934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:01.342000 audit[2810]: USER_AUTH pid=2810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=213.74.115.162 addr=213.74.115.162 terminal=ssh res=failed' Feb 12 22:15:01.343455 sshd[2810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.115.162 user=root Feb 12 22:15:01.346891 kernel: audit: type=1100 audit(1707776101.342:1100): pid=2810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=213.74.115.162 addr=213.74.115.162 terminal=ssh res=failed' Feb 12 22:15:01.377912 sshd[2650]: Failed password for root from 152.32.209.108 port 57646 ssh2 Feb 12 22:15:01.652617 env[1161]: time="2024-02-12T22:15:01.652587982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:01.653799 env[1161]: time="2024-02-12T22:15:01.653778757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:01.654863 env[1161]: time="2024-02-12T22:15:01.654848470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:01.656169 env[1161]: time="2024-02-12T22:15:01.656156729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:01.656532 env[1161]: time="2024-02-12T22:15:01.656514430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 22:15:01.661293 env[1161]: time="2024-02-12T22:15:01.657986927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 22:15:01.666817 env[1161]: time="2024-02-12T22:15:01.666794393Z" level=info msg="CreateContainer within sandbox \"737dbc73b3ba5712366ea4099a3f5cb7a0e9b6facee2954a1b21e792411a7959\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 22:15:01.675482 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1311342073.mount: Deactivated successfully. Feb 12 22:15:01.677389 env[1161]: time="2024-02-12T22:15:01.677363809Z" level=info msg="CreateContainer within sandbox \"737dbc73b3ba5712366ea4099a3f5cb7a0e9b6facee2954a1b21e792411a7959\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ee2ad5ff08cdf3f09ab89ea19f1542fd0aa560c60993550fa52195498b75d3be\"" Feb 12 22:15:01.678626 env[1161]: time="2024-02-12T22:15:01.678352816Z" level=info msg="StartContainer for \"ee2ad5ff08cdf3f09ab89ea19f1542fd0aa560c60993550fa52195498b75d3be\"" Feb 12 22:15:01.694716 systemd[1]: Started cri-containerd-ee2ad5ff08cdf3f09ab89ea19f1542fd0aa560c60993550fa52195498b75d3be.scope. Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.714188 kernel: audit: type=1400 audit(1707776101.708:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.714240 kernel: audit: type=1400 audit(1707776101.708:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.714260 kernel: audit: type=1400 audit(1707776101.708:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.722244 kernel: audit: type=1400 audit(1707776101.708:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.722283 kernel: audit: type=1400 audit(1707776101.708:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.728720 kernel: audit: type=1400 audit(1707776101.708:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.728752 kernel: audit: type=1400 audit(1707776101.708:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit: BPF prog-id=135 op=LOAD Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2668 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565326164356666303863646633663039616238396561313966313534 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2668 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565326164356666303863646633663039616238396561313966313534 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.708000 audit: BPF prog-id=136 op=LOAD Feb 12 22:15:01.708000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025b960 items=0 ppid=2668 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565326164356666303863646633663039616238396561313966313534 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.711000 audit: BPF prog-id=137 op=LOAD Feb 12 22:15:01.711000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025b9a8 items=0 ppid=2668 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:01.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565326164356666303863646633663039616238396561313966313534 Feb 12 22:15:01.716000 audit: BPF prog-id=137 op=UNLOAD Feb 12 22:15:01.716000 audit: BPF prog-id=136 op=UNLOAD Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:01.716000 audit: BPF prog-id=138 op=LOAD Feb 12 22:15:01.716000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025bdb8 items=0 ppid=2668 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:01.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565326164356666303863646633663039616238396561313966313534 Feb 12 22:15:01.750010 env[1161]: time="2024-02-12T22:15:01.749984497Z" level=info msg="StartContainer for \"ee2ad5ff08cdf3f09ab89ea19f1542fd0aa560c60993550fa52195498b75d3be\" returns successfully" Feb 12 22:15:02.104294 sshd[2813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 user=root Feb 12 22:15:02.103000 audit[2813]: USER_AUTH pid=2813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.61.232.86 addr=130.61.232.86 terminal=ssh res=failed' Feb 12 22:15:02.206476 kubelet[2213]: E0212 22:15:02.206448 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:02.290580 kubelet[2213]: E0212 22:15:02.290562 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.290695 kubelet[2213]: W0212 22:15:02.290683 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.290746 kubelet[2213]: E0212 22:15:02.290738 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.290885 kubelet[2213]: E0212 22:15:02.290879 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.290933 kubelet[2213]: W0212 22:15:02.290926 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.290979 kubelet[2213]: E0212 22:15:02.290972 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.291096 kubelet[2213]: E0212 22:15:02.291090 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.291141 kubelet[2213]: W0212 22:15:02.291134 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.291187 kubelet[2213]: E0212 22:15:02.291181 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.291324 kubelet[2213]: E0212 22:15:02.291318 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.291367 kubelet[2213]: W0212 22:15:02.291360 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.291414 kubelet[2213]: E0212 22:15:02.291407 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.291529 kubelet[2213]: E0212 22:15:02.291524 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.291575 kubelet[2213]: W0212 22:15:02.291568 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.291627 kubelet[2213]: E0212 22:15:02.291621 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.291750 kubelet[2213]: E0212 22:15:02.291745 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.291793 kubelet[2213]: W0212 22:15:02.291786 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.291843 kubelet[2213]: E0212 22:15:02.291837 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.291995 kubelet[2213]: E0212 22:15:02.291990 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.292040 kubelet[2213]: W0212 22:15:02.292033 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.292086 kubelet[2213]: E0212 22:15:02.292080 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.292206 kubelet[2213]: E0212 22:15:02.292200 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.292246 kubelet[2213]: W0212 22:15:02.292238 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.292290 kubelet[2213]: E0212 22:15:02.292284 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.292404 kubelet[2213]: E0212 22:15:02.292399 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.292447 kubelet[2213]: W0212 22:15:02.292440 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.292494 kubelet[2213]: E0212 22:15:02.292487 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.292612 kubelet[2213]: E0212 22:15:02.292606 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.292655 kubelet[2213]: W0212 22:15:02.292648 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.292699 kubelet[2213]: E0212 22:15:02.292693 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.292816 kubelet[2213]: E0212 22:15:02.292810 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.292873 kubelet[2213]: W0212 22:15:02.292866 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.292919 kubelet[2213]: E0212 22:15:02.292913 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.293036 kubelet[2213]: E0212 22:15:02.293031 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.293079 kubelet[2213]: W0212 22:15:02.293072 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.293123 kubelet[2213]: E0212 22:15:02.293117 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.297294 kubelet[2213]: E0212 22:15:02.297285 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.297361 kubelet[2213]: W0212 22:15:02.297353 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.297413 kubelet[2213]: E0212 22:15:02.297407 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.297577 kubelet[2213]: E0212 22:15:02.297571 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.297624 kubelet[2213]: W0212 22:15:02.297616 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.297670 kubelet[2213]: E0212 22:15:02.297664 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.299882 kubelet[2213]: E0212 22:15:02.299873 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.299941 kubelet[2213]: W0212 22:15:02.299932 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.300009 kubelet[2213]: E0212 22:15:02.300003 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.300160 kubelet[2213]: E0212 22:15:02.300154 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.300208 kubelet[2213]: W0212 22:15:02.300201 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.300261 kubelet[2213]: E0212 22:15:02.300254 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.300413 kubelet[2213]: E0212 22:15:02.300389 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.300413 kubelet[2213]: W0212 22:15:02.300397 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.300413 kubelet[2213]: E0212 22:15:02.300412 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.300883 kubelet[2213]: E0212 22:15:02.300872 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.300883 kubelet[2213]: W0212 22:15:02.300880 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.300955 kubelet[2213]: E0212 22:15:02.300891 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.300986 kubelet[2213]: E0212 22:15:02.300977 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.300986 kubelet[2213]: W0212 22:15:02.300984 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.301034 kubelet[2213]: E0212 22:15:02.300990 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.301493 kubelet[2213]: E0212 22:15:02.301484 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.301531 kubelet[2213]: W0212 22:15:02.301491 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.301569 kubelet[2213]: E0212 22:15:02.301562 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.301701 kubelet[2213]: E0212 22:15:02.301584 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.301735 kubelet[2213]: W0212 22:15:02.301700 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.301783 kubelet[2213]: E0212 22:15:02.301774 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.301783 kubelet[2213]: W0212 22:15:02.301780 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.301852 kubelet[2213]: E0212 22:15:02.301786 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.301899 kubelet[2213]: E0212 22:15:02.301891 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.301946 kubelet[2213]: E0212 22:15:02.301895 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.301993 kubelet[2213]: W0212 22:15:02.301985 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.302042 kubelet[2213]: E0212 22:15:02.302037 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.302189 kubelet[2213]: E0212 22:15:02.302182 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.302237 kubelet[2213]: W0212 22:15:02.302229 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.302285 kubelet[2213]: E0212 22:15:02.302279 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.302406 kubelet[2213]: E0212 22:15:02.302399 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.302452 kubelet[2213]: W0212 22:15:02.302444 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.302500 kubelet[2213]: E0212 22:15:02.302494 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.302609 kubelet[2213]: E0212 22:15:02.302604 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.302653 kubelet[2213]: W0212 22:15:02.302646 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.302703 kubelet[2213]: E0212 22:15:02.302697 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.302994 kubelet[2213]: E0212 22:15:02.302988 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.303043 kubelet[2213]: W0212 22:15:02.303035 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.303095 kubelet[2213]: E0212 22:15:02.303088 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.303197 kubelet[2213]: E0212 22:15:02.303186 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.303197 kubelet[2213]: W0212 22:15:02.303195 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.303260 kubelet[2213]: E0212 22:15:02.303205 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.303427 kubelet[2213]: E0212 22:15:02.303416 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.303427 kubelet[2213]: W0212 22:15:02.303425 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.303499 kubelet[2213]: E0212 22:15:02.303433 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.303627 kubelet[2213]: E0212 22:15:02.303616 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:02.303627 kubelet[2213]: W0212 22:15:02.303624 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:02.303678 kubelet[2213]: E0212 22:15:02.303631 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:02.684018 sshd[2650]: Received disconnect from 152.32.209.108 port 57646:11: Bye Bye [preauth] Feb 12 22:15:02.684018 sshd[2650]: Disconnected from authenticating user root 152.32.209.108 port 57646 [preauth] Feb 12 22:15:02.684652 systemd[1]: sshd@22-139.178.70.100:22-152.32.209.108:57646.service: Deactivated successfully. Feb 12 22:15:02.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-152.32.209.108:57646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:02.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.100:22-124.220.29.33:57814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:02.885453 systemd[1]: Started sshd@25-139.178.70.100:22-124.220.29.33:57814.service. Feb 12 22:15:03.256516 kubelet[2213]: I0212 22:15:03.256469 2213 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:15:03.298767 kubelet[2213]: E0212 22:15:03.298744 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.298767 kubelet[2213]: W0212 22:15:03.298758 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.298901 kubelet[2213]: E0212 22:15:03.298773 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.298931 kubelet[2213]: E0212 22:15:03.298902 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.298931 kubelet[2213]: W0212 22:15:03.298908 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.298931 kubelet[2213]: E0212 22:15:03.298926 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299024 kubelet[2213]: E0212 22:15:03.299020 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299053 kubelet[2213]: W0212 22:15:03.299026 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299053 kubelet[2213]: E0212 22:15:03.299034 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299173 kubelet[2213]: E0212 22:15:03.299158 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299173 kubelet[2213]: W0212 22:15:03.299166 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299242 kubelet[2213]: E0212 22:15:03.299181 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299289 kubelet[2213]: E0212 22:15:03.299276 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299289 kubelet[2213]: W0212 22:15:03.299284 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299356 kubelet[2213]: E0212 22:15:03.299298 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299415 kubelet[2213]: E0212 22:15:03.299393 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299415 kubelet[2213]: W0212 22:15:03.299402 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299482 kubelet[2213]: E0212 22:15:03.299426 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299584 kubelet[2213]: E0212 22:15:03.299564 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299644 kubelet[2213]: W0212 22:15:03.299591 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299644 kubelet[2213]: E0212 22:15:03.299604 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299726 kubelet[2213]: E0212 22:15:03.299713 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299726 kubelet[2213]: W0212 22:15:03.299723 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299795 kubelet[2213]: E0212 22:15:03.299738 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299851 kubelet[2213]: E0212 22:15:03.299838 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299851 kubelet[2213]: W0212 22:15:03.299847 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299926 kubelet[2213]: E0212 22:15:03.299854 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.299955 kubelet[2213]: E0212 22:15:03.299951 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.299982 kubelet[2213]: W0212 22:15:03.299956 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.299982 kubelet[2213]: E0212 22:15:03.299963 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.300070 kubelet[2213]: E0212 22:15:03.300056 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.300070 kubelet[2213]: W0212 22:15:03.300064 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.300070 kubelet[2213]: E0212 22:15:03.300071 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.300175 kubelet[2213]: E0212 22:15:03.300163 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.300175 kubelet[2213]: W0212 22:15:03.300171 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.300243 kubelet[2213]: E0212 22:15:03.300178 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.307438 kubelet[2213]: E0212 22:15:03.307372 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.307438 kubelet[2213]: W0212 22:15:03.307382 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.307438 kubelet[2213]: E0212 22:15:03.307393 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.307559 kubelet[2213]: E0212 22:15:03.307488 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.307559 kubelet[2213]: W0212 22:15:03.307492 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.307559 kubelet[2213]: E0212 22:15:03.307498 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.307637 kubelet[2213]: E0212 22:15:03.307616 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.307637 kubelet[2213]: W0212 22:15:03.307620 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.307637 kubelet[2213]: E0212 22:15:03.307625 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.307721 kubelet[2213]: E0212 22:15:03.307716 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.307721 kubelet[2213]: W0212 22:15:03.307720 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.307767 kubelet[2213]: E0212 22:15:03.307725 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308121 kubelet[2213]: E0212 22:15:03.307795 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308121 kubelet[2213]: W0212 22:15:03.307801 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308121 kubelet[2213]: E0212 22:15:03.307806 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308121 kubelet[2213]: E0212 22:15:03.307903 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308121 kubelet[2213]: W0212 22:15:03.307909 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308121 kubelet[2213]: E0212 22:15:03.307921 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308121 kubelet[2213]: E0212 22:15:03.308011 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308121 kubelet[2213]: W0212 22:15:03.308057 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308121 kubelet[2213]: E0212 22:15:03.308085 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308441 kubelet[2213]: E0212 22:15:03.308369 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308441 kubelet[2213]: W0212 22:15:03.308375 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308441 kubelet[2213]: E0212 22:15:03.308385 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308730 kubelet[2213]: E0212 22:15:03.308537 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308730 kubelet[2213]: W0212 22:15:03.308543 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308730 kubelet[2213]: E0212 22:15:03.308554 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308730 kubelet[2213]: E0212 22:15:03.308657 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308730 kubelet[2213]: W0212 22:15:03.308663 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308730 kubelet[2213]: E0212 22:15:03.308670 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308878 kubelet[2213]: E0212 22:15:03.308759 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308878 kubelet[2213]: W0212 22:15:03.308763 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.308878 kubelet[2213]: E0212 22:15:03.308777 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.308948 kubelet[2213]: E0212 22:15:03.308939 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.308948 kubelet[2213]: W0212 22:15:03.308945 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309184 kubelet[2213]: E0212 22:15:03.309015 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.309184 kubelet[2213]: E0212 22:15:03.309016 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.309184 kubelet[2213]: W0212 22:15:03.309037 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309184 kubelet[2213]: E0212 22:15:03.309067 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.309184 kubelet[2213]: E0212 22:15:03.309133 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.309184 kubelet[2213]: W0212 22:15:03.309138 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309184 kubelet[2213]: E0212 22:15:03.309170 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.309363 kubelet[2213]: E0212 22:15:03.309222 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.309363 kubelet[2213]: W0212 22:15:03.309226 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309363 kubelet[2213]: E0212 22:15:03.309232 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.309363 kubelet[2213]: E0212 22:15:03.309301 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.309363 kubelet[2213]: W0212 22:15:03.309305 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309363 kubelet[2213]: E0212 22:15:03.309311 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.309467 kubelet[2213]: E0212 22:15:03.309387 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.309467 kubelet[2213]: W0212 22:15:03.309391 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309467 kubelet[2213]: E0212 22:15:03.309397 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.309548 kubelet[2213]: E0212 22:15:03.309509 2213 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:15:03.309548 kubelet[2213]: W0212 22:15:03.309513 2213 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:15:03.309548 kubelet[2213]: E0212 22:15:03.309518 2213 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:15:03.467069 sshd[2813]: Failed password for root from 130.61.232.86 port 57934 ssh2 Feb 12 22:15:03.569034 sshd[2810]: Failed password for root from 213.74.115.162 port 60640 ssh2 Feb 12 22:15:03.957494 sshd[2813]: Received disconnect from 130.61.232.86 port 57934:11: Bye Bye [preauth] Feb 12 22:15:03.957494 sshd[2813]: Disconnected from authenticating user root 130.61.232.86 port 57934 [preauth] Feb 12 22:15:03.958090 systemd[1]: sshd@24-139.178.70.100:22-130.61.232.86:57934.service: Deactivated successfully. Feb 12 22:15:03.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.100:22-130.61.232.86:57934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:04.205971 kubelet[2213]: E0212 22:15:04.205944 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:04.765896 env[1161]: time="2024-02-12T22:15:04.765869917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:04.766667 env[1161]: time="2024-02-12T22:15:04.766653434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:04.767876 env[1161]: time="2024-02-12T22:15:04.767864284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:04.768941 env[1161]: time="2024-02-12T22:15:04.768924670Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:04.769491 env[1161]: time="2024-02-12T22:15:04.769475153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 22:15:04.771880 env[1161]: time="2024-02-12T22:15:04.771865183Z" level=info msg="CreateContainer within sandbox \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:15:04.777222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1408192656.mount: Deactivated successfully. Feb 12 22:15:04.792948 env[1161]: time="2024-02-12T22:15:04.792929146Z" level=info msg="CreateContainer within sandbox \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f\"" Feb 12 22:15:04.793915 env[1161]: time="2024-02-12T22:15:04.793901217Z" level=info msg="StartContainer for \"9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f\"" Feb 12 22:15:04.817946 systemd[1]: Started cri-containerd-9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f.scope. Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fbddc122b28 items=0 ppid=2742 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393437383936323866373232363932633062643639366639306231 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit: BPF prog-id=139 op=LOAD Feb 12 22:15:04.829000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0003180f8 items=0 ppid=2742 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393437383936323866373232363932633062643639366639306231 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit: BPF prog-id=140 op=LOAD Feb 12 22:15:04.829000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000318148 items=0 ppid=2742 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393437383936323866373232363932633062643639366639306231 Feb 12 22:15:04.829000 audit: BPF prog-id=140 op=UNLOAD Feb 12 22:15:04.829000 audit: BPF prog-id=139 op=UNLOAD Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:04.829000 audit: BPF prog-id=141 op=LOAD Feb 12 22:15:04.829000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003181d8 items=0 ppid=2742 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393437383936323866373232363932633062643639366639306231 Feb 12 22:15:04.855712 systemd[1]: cri-containerd-9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f.scope: Deactivated successfully. Feb 12 22:15:04.859000 audit: BPF prog-id=141 op=UNLOAD Feb 12 22:15:04.867487 env[1161]: time="2024-02-12T22:15:04.867463819Z" level=info msg="StartContainer for \"9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f\" returns successfully" Feb 12 22:15:04.960469 sshd[2810]: Received disconnect from 213.74.115.162 port 60640:11: Bye Bye [preauth] Feb 12 22:15:04.960469 sshd[2810]: Disconnected from authenticating user root 213.74.115.162 port 60640 [preauth] Feb 12 22:15:04.961272 systemd[1]: sshd@23-139.178.70.100:22-213.74.115.162:60640.service: Deactivated successfully. Feb 12 22:15:04.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-213.74.115.162:60640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:05.138382 env[1161]: time="2024-02-12T22:15:05.137016963Z" level=info msg="shim disconnected" id=9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f Feb 12 22:15:05.138382 env[1161]: time="2024-02-12T22:15:05.137055563Z" level=warning msg="cleaning up after shim disconnected" id=9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f namespace=k8s.io Feb 12 22:15:05.138382 env[1161]: time="2024-02-12T22:15:05.137062036Z" level=info msg="cleaning up dead shim" Feb 12 22:15:05.142480 env[1161]: time="2024-02-12T22:15:05.142458523Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:15:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2966 runtime=io.containerd.runc.v2\n" Feb 12 22:15:05.260959 env[1161]: time="2024-02-12T22:15:05.260937978Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 22:15:05.269264 kubelet[2213]: I0212 22:15:05.269245 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-759f9bb654-j5hhn" podStartSLOduration=-9.223372029585552e+09 pod.CreationTimestamp="2024-02-12 22:14:58 +0000 UTC" firstStartedPulling="2024-02-12 22:14:58.593771209 +0000 UTC m=+18.515462736" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:15:02.268072757 +0000 UTC m=+22.189764294" watchObservedRunningTime="2024-02-12 22:15:05.269223553 +0000 UTC m=+25.190915082" Feb 12 22:15:05.775549 systemd[1]: run-containerd-runc-k8s.io-9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f-runc.KYrbyx.mount: Deactivated successfully. Feb 12 22:15:05.775611 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9a94789628f722692c0bd696f90b11c181d1e9d4a26a27f8b751e5c384bd594f-rootfs.mount: Deactivated successfully. Feb 12 22:15:06.206766 kubelet[2213]: E0212 22:15:06.206722 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:06.897545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1499174072.mount: Deactivated successfully. Feb 12 22:15:08.206428 kubelet[2213]: E0212 22:15:08.206380 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:10.205723 kubelet[2213]: E0212 22:15:10.205202 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:11.274823 env[1161]: time="2024-02-12T22:15:11.274769684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:11.278558 env[1161]: time="2024-02-12T22:15:11.278542696Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:11.279514 env[1161]: time="2024-02-12T22:15:11.279500387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:11.280477 env[1161]: time="2024-02-12T22:15:11.280461775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:11.280952 env[1161]: time="2024-02-12T22:15:11.280939077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 22:15:11.283614 env[1161]: time="2024-02-12T22:15:11.283590723Z" level=info msg="CreateContainer within sandbox \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 22:15:11.289314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4158580994.mount: Deactivated successfully. Feb 12 22:15:11.300699 env[1161]: time="2024-02-12T22:15:11.300678875Z" level=info msg="CreateContainer within sandbox \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383\"" Feb 12 22:15:11.301077 env[1161]: time="2024-02-12T22:15:11.301066537Z" level=info msg="StartContainer for \"ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383\"" Feb 12 22:15:11.314802 systemd[1]: Started cri-containerd-ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383.scope. Feb 12 22:15:11.322388 systemd[1]: run-containerd-runc-k8s.io-ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383-runc.YPURvm.mount: Deactivated successfully. Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.341325 kernel: kauditd_printk_skb: 99 callbacks suppressed Feb 12 22:15:11.341367 kernel: audit: type=1400 audit(1707776111.333:1131): avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.341389 kernel: audit: type=1300 audit(1707776111.333:1131): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcb94e3e718 items=0 ppid=2742 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:11.341404 kernel: audit: type=1327 audit(1707776111.333:1131): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386437386133643231643861623234643937316132306231636665 Feb 12 22:15:11.333000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcb94e3e718 items=0 ppid=2742 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:11.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386437386133643231643861623234643937316132306231636665 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.350163 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.350204 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.353046 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.356910 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.359912 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.363863 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.363889 kernel: audit: type=1400 audit(1707776111.333:1132): avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit: BPF prog-id=142 op=LOAD Feb 12 22:15:11.333000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000291298 items=0 ppid=2742 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:11.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386437386133643231643861623234643937316132306231636665 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit: BPF prog-id=143 op=LOAD Feb 12 22:15:11.333000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002912e8 items=0 ppid=2742 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:11.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386437386133643231643861623234643937316132306231636665 Feb 12 22:15:11.333000 audit: BPF prog-id=143 op=UNLOAD Feb 12 22:15:11.333000 audit: BPF prog-id=142 op=UNLOAD Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:11.333000 audit: BPF prog-id=144 op=LOAD Feb 12 22:15:11.333000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000291378 items=0 ppid=2742 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:11.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386437386133643231643861623234643937316132306231636665 Feb 12 22:15:11.438005 env[1161]: time="2024-02-12T22:15:11.437942472Z" level=info msg="StartContainer for \"ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383\" returns successfully" Feb 12 22:15:12.206054 kubelet[2213]: E0212 22:15:12.206029 2213 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:12.877550 systemd[1]: cri-containerd-ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383.scope: Deactivated successfully. Feb 12 22:15:12.882000 audit: BPF prog-id=144 op=UNLOAD Feb 12 22:15:12.893438 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383-rootfs.mount: Deactivated successfully. Feb 12 22:15:12.896711 env[1161]: time="2024-02-12T22:15:12.895007029Z" level=info msg="shim disconnected" id=ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383 Feb 12 22:15:12.896711 env[1161]: time="2024-02-12T22:15:12.895031372Z" level=warning msg="cleaning up after shim disconnected" id=ae8d78a3d21d8ab24d971a20b1cfe98bd70f783f6f956020a2a61b3bd6109383 namespace=k8s.io Feb 12 22:15:12.896711 env[1161]: time="2024-02-12T22:15:12.895036964Z" level=info msg="cleaning up dead shim" Feb 12 22:15:12.899286 env[1161]: time="2024-02-12T22:15:12.899271891Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:15:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3039 runtime=io.containerd.runc.v2\n" Feb 12 22:15:12.929320 kubelet[2213]: I0212 22:15:12.929305 2213 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 22:15:12.955072 kubelet[2213]: I0212 22:15:12.955054 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:15:12.956767 kubelet[2213]: I0212 22:15:12.956742 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:15:12.956955 kubelet[2213]: I0212 22:15:12.956942 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:15:12.964708 systemd[1]: Created slice kubepods-burstable-podba9e8d56_d1ac_43ad_a596_f39c3905f185.slice. Feb 12 22:15:12.968662 systemd[1]: Created slice kubepods-burstable-pod751b31f7_2085_4b5f_97c2_eebc174ff7de.slice. Feb 12 22:15:12.971793 systemd[1]: Created slice kubepods-besteffort-pod89bf2018_6132_4f18_acae_ca2347433bab.slice. Feb 12 22:15:13.066171 kubelet[2213]: I0212 22:15:13.066131 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2k9mf\" (UniqueName: \"kubernetes.io/projected/751b31f7-2085-4b5f-97c2-eebc174ff7de-kube-api-access-2k9mf\") pod \"coredns-787d4945fb-hpk45\" (UID: \"751b31f7-2085-4b5f-97c2-eebc174ff7de\") " pod="kube-system/coredns-787d4945fb-hpk45" Feb 12 22:15:13.070879 kubelet[2213]: I0212 22:15:13.066178 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fl8fv\" (UniqueName: \"kubernetes.io/projected/ba9e8d56-d1ac-43ad-a596-f39c3905f185-kube-api-access-fl8fv\") pod \"coredns-787d4945fb-x922s\" (UID: \"ba9e8d56-d1ac-43ad-a596-f39c3905f185\") " pod="kube-system/coredns-787d4945fb-x922s" Feb 12 22:15:13.070879 kubelet[2213]: I0212 22:15:13.066194 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/89bf2018-6132-4f18-acae-ca2347433bab-tigera-ca-bundle\") pod \"calico-kube-controllers-6fb6955f4-hqlg9\" (UID: \"89bf2018-6132-4f18-acae-ca2347433bab\") " pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" Feb 12 22:15:13.070879 kubelet[2213]: I0212 22:15:13.066209 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ba9e8d56-d1ac-43ad-a596-f39c3905f185-config-volume\") pod \"coredns-787d4945fb-x922s\" (UID: \"ba9e8d56-d1ac-43ad-a596-f39c3905f185\") " pod="kube-system/coredns-787d4945fb-x922s" Feb 12 22:15:13.070879 kubelet[2213]: I0212 22:15:13.066221 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxhjz\" (UniqueName: \"kubernetes.io/projected/89bf2018-6132-4f18-acae-ca2347433bab-kube-api-access-hxhjz\") pod \"calico-kube-controllers-6fb6955f4-hqlg9\" (UID: \"89bf2018-6132-4f18-acae-ca2347433bab\") " pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" Feb 12 22:15:13.070879 kubelet[2213]: I0212 22:15:13.066233 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/751b31f7-2085-4b5f-97c2-eebc174ff7de-config-volume\") pod \"coredns-787d4945fb-hpk45\" (UID: \"751b31f7-2085-4b5f-97c2-eebc174ff7de\") " pod="kube-system/coredns-787d4945fb-hpk45" Feb 12 22:15:13.267974 env[1161]: time="2024-02-12T22:15:13.267945345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-x922s,Uid:ba9e8d56-d1ac-43ad-a596-f39c3905f185,Namespace:kube-system,Attempt:0,}" Feb 12 22:15:13.274648 env[1161]: time="2024-02-12T22:15:13.274627188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6fb6955f4-hqlg9,Uid:89bf2018-6132-4f18-acae-ca2347433bab,Namespace:calico-system,Attempt:0,}" Feb 12 22:15:13.274864 env[1161]: time="2024-02-12T22:15:13.274845168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hpk45,Uid:751b31f7-2085-4b5f-97c2-eebc174ff7de,Namespace:kube-system,Attempt:0,}" Feb 12 22:15:13.281754 env[1161]: time="2024-02-12T22:15:13.281057844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 22:15:13.361948 env[1161]: time="2024-02-12T22:15:13.361901885Z" level=error msg="Failed to destroy network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.362367 env[1161]: time="2024-02-12T22:15:13.362328532Z" level=error msg="encountered an error cleaning up failed sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.362528 env[1161]: time="2024-02-12T22:15:13.362510062Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6fb6955f4-hqlg9,Uid:89bf2018-6132-4f18-acae-ca2347433bab,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.365628 env[1161]: time="2024-02-12T22:15:13.365601092Z" level=error msg="Failed to destroy network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.365984 env[1161]: time="2024-02-12T22:15:13.365966417Z" level=error msg="encountered an error cleaning up failed sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.366098 env[1161]: time="2024-02-12T22:15:13.366065463Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-x922s,Uid:ba9e8d56-d1ac-43ad-a596-f39c3905f185,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.368870 kubelet[2213]: E0212 22:15:13.368852 2213 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.369206 kubelet[2213]: E0212 22:15:13.369003 2213 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.377668 kubelet[2213]: E0212 22:15:13.377655 2213 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" Feb 12 22:15:13.377715 kubelet[2213]: E0212 22:15:13.377678 2213 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" Feb 12 22:15:13.377715 kubelet[2213]: E0212 22:15:13.377709 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6fb6955f4-hqlg9_calico-system(89bf2018-6132-4f18-acae-ca2347433bab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6fb6955f4-hqlg9_calico-system(89bf2018-6132-4f18-acae-ca2347433bab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" podUID=89bf2018-6132-4f18-acae-ca2347433bab Feb 12 22:15:13.378289 kubelet[2213]: E0212 22:15:13.378276 2213 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-x922s" Feb 12 22:15:13.378325 kubelet[2213]: E0212 22:15:13.378304 2213 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-x922s" Feb 12 22:15:13.378350 kubelet[2213]: E0212 22:15:13.378328 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-x922s_kube-system(ba9e8d56-d1ac-43ad-a596-f39c3905f185)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-x922s_kube-system(ba9e8d56-d1ac-43ad-a596-f39c3905f185)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-x922s" podUID=ba9e8d56-d1ac-43ad-a596-f39c3905f185 Feb 12 22:15:13.386729 env[1161]: time="2024-02-12T22:15:13.386688859Z" level=error msg="Failed to destroy network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.386948 env[1161]: time="2024-02-12T22:15:13.386926699Z" level=error msg="encountered an error cleaning up failed sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.395051 env[1161]: time="2024-02-12T22:15:13.386962406Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hpk45,Uid:751b31f7-2085-4b5f-97c2-eebc174ff7de,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.395111 kubelet[2213]: E0212 22:15:13.387091 2213 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:13.395111 kubelet[2213]: E0212 22:15:13.387132 2213 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-hpk45" Feb 12 22:15:13.395111 kubelet[2213]: E0212 22:15:13.387148 2213 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-hpk45" Feb 12 22:15:13.395197 kubelet[2213]: E0212 22:15:13.387196 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-hpk45_kube-system(751b31f7-2085-4b5f-97c2-eebc174ff7de)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-hpk45_kube-system(751b31f7-2085-4b5f-97c2-eebc174ff7de)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-hpk45" podUID=751b31f7-2085-4b5f-97c2-eebc174ff7de Feb 12 22:15:13.894044 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52-shm.mount: Deactivated successfully. Feb 12 22:15:13.894113 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb-shm.mount: Deactivated successfully. Feb 12 22:15:14.209856 systemd[1]: Created slice kubepods-besteffort-podb1d4a8b2_7626_4b49_927f_6d4573ba6436.slice. Feb 12 22:15:14.211423 env[1161]: time="2024-02-12T22:15:14.211397463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hsbwn,Uid:b1d4a8b2-7626-4b49-927f-6d4573ba6436,Namespace:calico-system,Attempt:0,}" Feb 12 22:15:14.243809 env[1161]: time="2024-02-12T22:15:14.243766800Z" level=error msg="Failed to destroy network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.244890 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988-shm.mount: Deactivated successfully. Feb 12 22:15:14.245460 env[1161]: time="2024-02-12T22:15:14.245432552Z" level=error msg="encountered an error cleaning up failed sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.245730 env[1161]: time="2024-02-12T22:15:14.245471749Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hsbwn,Uid:b1d4a8b2-7626-4b49-927f-6d4573ba6436,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.245769 kubelet[2213]: E0212 22:15:14.245651 2213 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.245769 kubelet[2213]: E0212 22:15:14.245681 2213 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:15:14.245769 kubelet[2213]: E0212 22:15:14.245707 2213 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hsbwn" Feb 12 22:15:14.245877 kubelet[2213]: E0212 22:15:14.245738 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hsbwn_calico-system(b1d4a8b2-7626-4b49-927f-6d4573ba6436)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hsbwn_calico-system(b1d4a8b2-7626-4b49-927f-6d4573ba6436)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:14.275582 kubelet[2213]: I0212 22:15:14.275562 2213 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:14.277458 kubelet[2213]: I0212 22:15:14.277210 2213 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:14.279502 kubelet[2213]: I0212 22:15:14.279284 2213 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:14.280731 kubelet[2213]: I0212 22:15:14.280557 2213 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:14.284103 env[1161]: time="2024-02-12T22:15:14.284082729Z" level=info msg="StopPodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\"" Feb 12 22:15:14.284458 env[1161]: time="2024-02-12T22:15:14.284441470Z" level=info msg="StopPodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\"" Feb 12 22:15:14.284878 env[1161]: time="2024-02-12T22:15:14.284821443Z" level=info msg="StopPodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\"" Feb 12 22:15:14.285417 env[1161]: time="2024-02-12T22:15:14.284935833Z" level=info msg="StopPodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\"" Feb 12 22:15:14.309713 env[1161]: time="2024-02-12T22:15:14.309674471Z" level=error msg="StopPodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" failed" error="failed to destroy network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.310000 kubelet[2213]: E0212 22:15:14.309985 2213 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:14.310064 kubelet[2213]: E0212 22:15:14.310024 2213 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb} Feb 12 22:15:14.310064 kubelet[2213]: E0212 22:15:14.310046 2213 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba9e8d56-d1ac-43ad-a596-f39c3905f185\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:15:14.310136 kubelet[2213]: E0212 22:15:14.310071 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba9e8d56-d1ac-43ad-a596-f39c3905f185\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-x922s" podUID=ba9e8d56-d1ac-43ad-a596-f39c3905f185 Feb 12 22:15:14.319249 env[1161]: time="2024-02-12T22:15:14.319207112Z" level=error msg="StopPodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" failed" error="failed to destroy network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.319450 env[1161]: time="2024-02-12T22:15:14.319386876Z" level=error msg="StopPodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" failed" error="failed to destroy network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.320505 kubelet[2213]: E0212 22:15:14.319673 2213 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:14.320505 kubelet[2213]: E0212 22:15:14.319697 2213 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52} Feb 12 22:15:14.320505 kubelet[2213]: E0212 22:15:14.319728 2213 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89bf2018-6132-4f18-acae-ca2347433bab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:15:14.320505 kubelet[2213]: E0212 22:15:14.319748 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89bf2018-6132-4f18-acae-ca2347433bab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" podUID=89bf2018-6132-4f18-acae-ca2347433bab Feb 12 22:15:14.320651 kubelet[2213]: E0212 22:15:14.319866 2213 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:14.320651 kubelet[2213]: E0212 22:15:14.319879 2213 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988} Feb 12 22:15:14.320651 kubelet[2213]: E0212 22:15:14.319898 2213 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:15:14.320651 kubelet[2213]: E0212 22:15:14.319912 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b1d4a8b2-7626-4b49-927f-6d4573ba6436\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hsbwn" podUID=b1d4a8b2-7626-4b49-927f-6d4573ba6436 Feb 12 22:15:14.324907 env[1161]: time="2024-02-12T22:15:14.324875221Z" level=error msg="StopPodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" failed" error="failed to destroy network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:15:14.325118 kubelet[2213]: E0212 22:15:14.325050 2213 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:14.325118 kubelet[2213]: E0212 22:15:14.325066 2213 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e} Feb 12 22:15:14.325118 kubelet[2213]: E0212 22:15:14.325086 2213 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"751b31f7-2085-4b5f-97c2-eebc174ff7de\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:15:14.325118 kubelet[2213]: E0212 22:15:14.325101 2213 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"751b31f7-2085-4b5f-97c2-eebc174ff7de\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-hpk45" podUID=751b31f7-2085-4b5f-97c2-eebc174ff7de Feb 12 22:15:16.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.100:22-178.128.219.157:37684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:16.243608 systemd[1]: Started sshd@26-139.178.70.100:22-178.128.219.157:37684.service. Feb 12 22:15:16.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.100:22-101.42.7.118:45186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:16.872948 systemd[1]: Started sshd@27-139.178.70.100:22-101.42.7.118:45186.service. Feb 12 22:15:16.873979 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 12 22:15:16.874031 kernel: audit: type=1130 audit(1707776116.872:1139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.100:22-101.42.7.118:45186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:17.699123 sshd[3258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.219.157 user=root Feb 12 22:15:17.703099 kernel: audit: type=1100 audit(1707776117.698:1140): pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=178.128.219.157 addr=178.128.219.157 terminal=ssh res=failed' Feb 12 22:15:17.698000 audit[3258]: USER_AUTH pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=178.128.219.157 addr=178.128.219.157 terminal=ssh res=failed' Feb 12 22:15:17.903000 audit[3261]: USER_AUTH pid=3261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:15:17.904672 sshd[3261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:15:17.907855 kernel: audit: type=1100 audit(1707776117.903:1141): pid=3261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:15:19.345226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3969125927.mount: Deactivated successfully. Feb 12 22:15:19.377077 env[1161]: time="2024-02-12T22:15:19.377011201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:19.378418 env[1161]: time="2024-02-12T22:15:19.378399576Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:19.379291 env[1161]: time="2024-02-12T22:15:19.379273932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:19.380152 env[1161]: time="2024-02-12T22:15:19.380137323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:19.380486 env[1161]: time="2024-02-12T22:15:19.380465150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 22:15:19.400051 env[1161]: time="2024-02-12T22:15:19.400027061Z" level=info msg="CreateContainer within sandbox \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 22:15:19.405545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2188504953.mount: Deactivated successfully. Feb 12 22:15:19.418790 env[1161]: time="2024-02-12T22:15:19.418759947Z" level=info msg="CreateContainer within sandbox \"1982cb88238dc0babc89ed85b70bae026f5e486fb288d9c946cd160b0df3ba4c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54\"" Feb 12 22:15:19.420864 env[1161]: time="2024-02-12T22:15:19.420824237Z" level=info msg="StartContainer for \"e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54\"" Feb 12 22:15:19.434322 systemd[1]: Started cri-containerd-e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54.scope. Feb 12 22:15:19.454851 kernel: audit: type=1400 audit(1707776119.447:1142): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454925 kernel: audit: type=1300 audit(1707776119.447:1142): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fecf8484968 items=0 ppid=2742 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.476327 kernel: audit: type=1327 audit(1707776119.447:1142): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536303634353332613239636464633062313339306263336530376337 Feb 12 22:15:19.476372 kernel: audit: type=1400 audit(1707776119.447:1143): avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.476387 kernel: audit: type=1400 audit(1707776119.447:1143): avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.476400 kernel: audit: type=1400 audit(1707776119.447:1143): avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.476413 kernel: audit: type=1400 audit(1707776119.447:1143): avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fecf8484968 items=0 ppid=2742 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:19.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536303634353332613239636464633062313339306263336530376337 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.447000 audit: BPF prog-id=145 op=LOAD Feb 12 22:15:19.447000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000231478 items=0 ppid=2742 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:19.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536303634353332613239636464633062313339306263336530376337 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.450000 audit: BPF prog-id=146 op=LOAD Feb 12 22:15:19.450000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002314c8 items=0 ppid=2742 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:19.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536303634353332613239636464633062313339306263336530376337 Feb 12 22:15:19.454000 audit: BPF prog-id=146 op=UNLOAD Feb 12 22:15:19.454000 audit: BPF prog-id=145 op=UNLOAD Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:19.454000 audit: BPF prog-id=147 op=LOAD Feb 12 22:15:19.454000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000231558 items=0 ppid=2742 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:19.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536303634353332613239636464633062313339306263336530376337 Feb 12 22:15:19.491804 env[1161]: time="2024-02-12T22:15:19.476647952Z" level=info msg="StartContainer for \"e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54\" returns successfully" Feb 12 22:15:19.788990 sshd[3258]: Failed password for root from 178.128.219.157 port 37684 ssh2 Feb 12 22:15:19.995023 sshd[3261]: Failed password for root from 101.42.7.118 port 45186 ssh2 Feb 12 22:15:20.075407 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 22:15:20.075467 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 22:15:20.362444 kubelet[2213]: I0212 22:15:20.362420 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-stghk" podStartSLOduration=-9.223372014507904e+09 pod.CreationTimestamp="2024-02-12 22:14:58 +0000 UTC" firstStartedPulling="2024-02-12 22:14:58.901545287 +0000 UTC m=+18.823236814" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:15:20.335705034 +0000 UTC m=+40.257396564" watchObservedRunningTime="2024-02-12 22:15:20.346871053 +0000 UTC m=+40.268562583" Feb 12 22:15:21.328005 kubelet[2213]: I0212 22:15:21.327987 2213 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:15:21.394903 sshd[3258]: Received disconnect from 178.128.219.157 port 37684:11: Bye Bye [preauth] Feb 12 22:15:21.394903 sshd[3258]: Disconnected from authenticating user root 178.128.219.157 port 37684 [preauth] Feb 12 22:15:21.395792 systemd[1]: sshd@26-139.178.70.100:22-178.128.219.157:37684.service: Deactivated successfully. Feb 12 22:15:21.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.100:22-178.128.219.157:37684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:21.521063 sshd[3261]: Received disconnect from 101.42.7.118 port 45186:11: Bye Bye [preauth] Feb 12 22:15:21.521063 sshd[3261]: Disconnected from authenticating user root 101.42.7.118 port 45186 [preauth] Feb 12 22:15:21.521989 systemd[1]: sshd@27-139.178.70.100:22-101.42.7.118:45186.service: Deactivated successfully. Feb 12 22:15:21.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.100:22-101.42.7.118:45186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:21.715000 audit[3386]: AVC avc: denied { write } for pid=3386 comm="tee" name="fd" dev="proc" ino=35371 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.715000 audit[3386]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc409bd997 a2=241 a3=1b6 items=1 ppid=3346 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.715000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 22:15:21.715000 audit: PATH item=0 name="/dev/fd/63" inode=35362 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.715000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:21.725000 audit[3405]: AVC avc: denied { write } for pid=3405 comm="tee" name="fd" dev="proc" ino=35375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.725000 audit[3405]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb571e987 a2=241 a3=1b6 items=1 ppid=3344 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.725000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 22:15:21.725000 audit: PATH item=0 name="/dev/fd/63" inode=36756 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:21.727000 audit[3391]: AVC avc: denied { write } for pid=3391 comm="tee" name="fd" dev="proc" ino=36761 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.727000 audit[3389]: AVC avc: denied { write } for pid=3389 comm="tee" name="fd" dev="proc" ino=36764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.727000 audit[3389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd58afe997 a2=241 a3=1b6 items=1 ppid=3342 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.727000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 22:15:21.727000 audit: PATH item=0 name="/dev/fd/63" inode=35365 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.727000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:21.727000 audit[3391]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2fb7a997 a2=241 a3=1b6 items=1 ppid=3352 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.727000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 22:15:21.727000 audit: PATH item=0 name="/dev/fd/63" inode=35368 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.727000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:21.733000 audit[3407]: AVC avc: denied { write } for pid=3407 comm="tee" name="fd" dev="proc" ino=36775 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.743000 audit[3411]: AVC avc: denied { write } for pid=3411 comm="tee" name="fd" dev="proc" ino=36778 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.733000 audit[3407]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5c7fd988 a2=241 a3=1b6 items=1 ppid=3354 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.733000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 22:15:21.733000 audit: PATH item=0 name="/dev/fd/63" inode=35379 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.733000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:21.743000 audit[3411]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff745b6998 a2=241 a3=1b6 items=1 ppid=3345 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.743000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 22:15:21.743000 audit: PATH item=0 name="/dev/fd/63" inode=36770 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.743000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:21.776000 audit[3417]: AVC avc: denied { write } for pid=3417 comm="tee" name="fd" dev="proc" ino=36785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:15:21.776000 audit[3417]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff82cb0999 a2=241 a3=1b6 items=1 ppid=3350 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:21.776000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 22:15:21.776000 audit: PATH item=0 name="/dev/fd/63" inode=35389 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:15:21.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:15:25.014894 kubelet[2213]: I0212 22:15:25.014860 2213 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:15:25.030629 systemd[1]: run-containerd-runc-k8s.io-e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54-runc.xv88hm.mount: Deactivated successfully. Feb 12 22:15:26.027169 systemd[1]: run-containerd-runc-k8s.io-e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54-runc.w0lj84.mount: Deactivated successfully. Feb 12 22:15:26.206702 env[1161]: time="2024-02-12T22:15:26.206668234Z" level=info msg="StopPodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\"" Feb 12 22:15:26.207034 env[1161]: time="2024-02-12T22:15:26.207012125Z" level=info msg="StopPodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\"" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.263 [INFO][3589] k8s.go 578: Cleaning up netns ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.263 [INFO][3589] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" iface="eth0" netns="/var/run/netns/cni-589c2ad3-5f21-c2d5-03b6-1df8c3dcee2f" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.263 [INFO][3589] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" iface="eth0" netns="/var/run/netns/cni-589c2ad3-5f21-c2d5-03b6-1df8c3dcee2f" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.263 [INFO][3589] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" iface="eth0" netns="/var/run/netns/cni-589c2ad3-5f21-c2d5-03b6-1df8c3dcee2f" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.263 [INFO][3589] k8s.go 585: Releasing IP address(es) ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.263 [INFO][3589] utils.go 188: Calico CNI releasing IP address ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.461 [INFO][3601] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.463 [INFO][3601] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.463 [INFO][3601] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.474 [WARNING][3601] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.474 [INFO][3601] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.475 [INFO][3601] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:26.479802 env[1161]: 2024-02-12 22:15:26.476 [INFO][3589] k8s.go 591: Teardown processing complete. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:26.483165 systemd[1]: run-netns-cni\x2d589c2ad3\x2d5f21\x2dc2d5\x2d03b6\x2d1df8c3dcee2f.mount: Deactivated successfully. Feb 12 22:15:26.483906 env[1161]: time="2024-02-12T22:15:26.483778403Z" level=info msg="TearDown network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" successfully" Feb 12 22:15:26.483975 env[1161]: time="2024-02-12T22:15:26.483961342Z" level=info msg="StopPodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" returns successfully" Feb 12 22:15:26.484866 env[1161]: time="2024-02-12T22:15:26.484850287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-x922s,Uid:ba9e8d56-d1ac-43ad-a596-f39c3905f185,Namespace:kube-system,Attempt:1,}" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.260 [INFO][3588] k8s.go 578: Cleaning up netns ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.262 [INFO][3588] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" iface="eth0" netns="/var/run/netns/cni-8d017e09-5e7a-6a04-488c-40e06e27f5d5" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.262 [INFO][3588] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" iface="eth0" netns="/var/run/netns/cni-8d017e09-5e7a-6a04-488c-40e06e27f5d5" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.263 [INFO][3588] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" iface="eth0" netns="/var/run/netns/cni-8d017e09-5e7a-6a04-488c-40e06e27f5d5" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.263 [INFO][3588] k8s.go 585: Releasing IP address(es) ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.263 [INFO][3588] utils.go 188: Calico CNI releasing IP address ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.461 [INFO][3600] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.463 [INFO][3600] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.475 [INFO][3600] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.487 [WARNING][3600] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.489 [INFO][3600] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.490 [INFO][3600] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:26.496532 env[1161]: 2024-02-12 22:15:26.495 [INFO][3588] k8s.go 591: Teardown processing complete. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:26.498854 env[1161]: time="2024-02-12T22:15:26.497938396Z" level=info msg="TearDown network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" successfully" Feb 12 22:15:26.498854 env[1161]: time="2024-02-12T22:15:26.497957156Z" level=info msg="StopPodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" returns successfully" Feb 12 22:15:26.497552 systemd[1]: run-netns-cni\x2d8d017e09\x2d5e7a\x2d6a04\x2d488c\x2d40e06e27f5d5.mount: Deactivated successfully. Feb 12 22:15:26.499265 env[1161]: time="2024-02-12T22:15:26.499245038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6fb6955f4-hqlg9,Uid:89bf2018-6132-4f18-acae-ca2347433bab,Namespace:calico-system,Attempt:1,}" Feb 12 22:15:26.588560 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:15:26.588639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia62b538b3ba: link becomes ready Feb 12 22:15:26.591158 systemd-networkd[1062]: calia62b538b3ba: Link UP Feb 12 22:15:26.591268 systemd-networkd[1062]: calia62b538b3ba: Gained carrier Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.512 [INFO][3612] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.520 [INFO][3612] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--787d4945fb--x922s-eth0 coredns-787d4945fb- kube-system ba9e8d56-d1ac-43ad-a596-f39c3905f185 679 0 2024-02-12 22:14:53 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-787d4945fb-x922s eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia62b538b3ba [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.520 [INFO][3612] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.545 [INFO][3637] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" HandleID="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.555 [INFO][3637] ipam_plugin.go 268: Auto assigning IP ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" HandleID="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325040), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-787d4945fb-x922s", "timestamp":"2024-02-12 22:15:26.545508837 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.555 [INFO][3637] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.555 [INFO][3637] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.555 [INFO][3637] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.558 [INFO][3637] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.562 [INFO][3637] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.565 [INFO][3637] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.566 [INFO][3637] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.567 [INFO][3637] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.567 [INFO][3637] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.568 [INFO][3637] ipam.go 1682: Creating new handle: k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0 Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.569 [INFO][3637] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.572 [INFO][3637] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.572 [INFO][3637] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" host="localhost" Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.572 [INFO][3637] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:26.602112 env[1161]: 2024-02-12 22:15:26.572 [INFO][3637] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" HandleID="k8s-pod-network.9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.604075 env[1161]: 2024-02-12 22:15:26.573 [INFO][3612] k8s.go 385: Populated endpoint ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--x922s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ba9e8d56-d1ac-43ad-a596-f39c3905f185", ResourceVersion:"679", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-787d4945fb-x922s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia62b538b3ba", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:26.604075 env[1161]: 2024-02-12 22:15:26.573 [INFO][3612] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.604075 env[1161]: 2024-02-12 22:15:26.573 [INFO][3612] dataplane_linux.go 68: Setting the host side veth name to calia62b538b3ba ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.604075 env[1161]: 2024-02-12 22:15:26.588 [INFO][3612] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.604075 env[1161]: 2024-02-12 22:15:26.589 [INFO][3612] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--x922s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ba9e8d56-d1ac-43ad-a596-f39c3905f185", ResourceVersion:"679", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0", Pod:"coredns-787d4945fb-x922s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia62b538b3ba", MAC:"de:0d:97:50:7d:e7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:26.604075 env[1161]: 2024-02-12 22:15:26.600 [INFO][3612] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0" Namespace="kube-system" Pod="coredns-787d4945fb-x922s" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:26.610923 systemd-networkd[1062]: cali36a5a34e16b: Link UP Feb 12 22:15:26.612383 systemd-networkd[1062]: cali36a5a34e16b: Gained carrier Feb 12 22:15:26.612853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali36a5a34e16b: link becomes ready Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.528 [INFO][3623] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.533 [INFO][3623] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0 calico-kube-controllers-6fb6955f4- calico-system 89bf2018-6132-4f18-acae-ca2347433bab 678 0 2024-02-12 22:14:58 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6fb6955f4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6fb6955f4-hqlg9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali36a5a34e16b [] []}} ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.533 [INFO][3623] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.562 [INFO][3644] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" HandleID="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.570 [INFO][3644] ipam_plugin.go 268: Auto assigning IP ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" HandleID="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad9d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6fb6955f4-hqlg9", "timestamp":"2024-02-12 22:15:26.562638485 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.570 [INFO][3644] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.573 [INFO][3644] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.573 [INFO][3644] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.574 [INFO][3644] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.576 [INFO][3644] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.578 [INFO][3644] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.579 [INFO][3644] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.580 [INFO][3644] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.580 [INFO][3644] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.581 [INFO][3644] ipam.go 1682: Creating new handle: k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326 Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.583 [INFO][3644] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.596 [INFO][3644] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.596 [INFO][3644] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" host="localhost" Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.596 [INFO][3644] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:26.621855 env[1161]: 2024-02-12 22:15:26.596 [INFO][3644] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" HandleID="k8s-pod-network.aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.622479 env[1161]: 2024-02-12 22:15:26.602 [INFO][3623] k8s.go 385: Populated endpoint ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0", GenerateName:"calico-kube-controllers-6fb6955f4-", Namespace:"calico-system", SelfLink:"", UID:"89bf2018-6132-4f18-acae-ca2347433bab", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6fb6955f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6fb6955f4-hqlg9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali36a5a34e16b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:26.622479 env[1161]: 2024-02-12 22:15:26.603 [INFO][3623] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.622479 env[1161]: 2024-02-12 22:15:26.603 [INFO][3623] dataplane_linux.go 68: Setting the host side veth name to cali36a5a34e16b ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.622479 env[1161]: 2024-02-12 22:15:26.612 [INFO][3623] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.622479 env[1161]: 2024-02-12 22:15:26.613 [INFO][3623] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0", GenerateName:"calico-kube-controllers-6fb6955f4-", Namespace:"calico-system", SelfLink:"", UID:"89bf2018-6132-4f18-acae-ca2347433bab", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6fb6955f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326", Pod:"calico-kube-controllers-6fb6955f4-hqlg9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali36a5a34e16b", MAC:"a2:be:06:bd:13:f3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:26.622479 env[1161]: 2024-02-12 22:15:26.619 [INFO][3623] k8s.go 491: Wrote updated endpoint to datastore ContainerID="aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326" Namespace="calico-system" Pod="calico-kube-controllers-6fb6955f4-hqlg9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:26.626642 env[1161]: time="2024-02-12T22:15:26.623854766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:15:26.626642 env[1161]: time="2024-02-12T22:15:26.623877487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:15:26.626642 env[1161]: time="2024-02-12T22:15:26.623884576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:15:26.626642 env[1161]: time="2024-02-12T22:15:26.624824236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0 pid=3675 runtime=io.containerd.runc.v2 Feb 12 22:15:26.631914 env[1161]: time="2024-02-12T22:15:26.631884336Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:15:26.632009 env[1161]: time="2024-02-12T22:15:26.631995080Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:15:26.632082 env[1161]: time="2024-02-12T22:15:26.632059226Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:15:26.632188 env[1161]: time="2024-02-12T22:15:26.632164688Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326 pid=3708 runtime=io.containerd.runc.v2 Feb 12 22:15:26.635378 systemd[1]: Started cri-containerd-9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0.scope. Feb 12 22:15:26.651779 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 12 22:15:26.651856 kernel: audit: type=1400 audit(1707776126.645:1157): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651882 kernel: audit: type=1400 audit(1707776126.645:1158): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.659498 kernel: audit: type=1400 audit(1707776126.645:1159): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.659528 kernel: audit: type=1400 audit(1707776126.645:1160): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.659543 kernel: audit: type=1400 audit(1707776126.645:1161): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.660396 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.666844 kernel: audit: type=1400 audit(1707776126.645:1162): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.666878 kernel: audit: type=1400 audit(1707776126.645:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.670707 kernel: audit: type=1400 audit(1707776126.645:1164): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.673871 kernel: audit: type=1400 audit(1707776126.645:1165): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.674264 systemd[1]: Started cri-containerd-aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326.scope. Feb 12 22:15:26.678796 kernel: audit: type=1400 audit(1707776126.648:1166): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.648000 audit: BPF prog-id=148 op=LOAD Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3675 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613463626231666332373732373434313266396339363763356637 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3675 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613463626231666332373732373434313266396339363763356637 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.651000 audit: BPF prog-id=149 op=LOAD Feb 12 22:15:26.651000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ba0e0 items=0 ppid=3675 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613463626231666332373732373434313266396339363763356637 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit: BPF prog-id=150 op=LOAD Feb 12 22:15:26.656000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ba128 items=0 ppid=3675 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613463626231666332373732373434313266396339363763356637 Feb 12 22:15:26.656000 audit: BPF prog-id=150 op=UNLOAD Feb 12 22:15:26.656000 audit: BPF prog-id=149 op=UNLOAD Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.656000 audit: BPF prog-id=151 op=LOAD Feb 12 22:15:26.656000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ba538 items=0 ppid=3675 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966613463626231666332373732373434313266396339363763356637 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.685000 audit: BPF prog-id=152 op=LOAD Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3708 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663634323139383963323764326162373133383739306233333239 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3708 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663634323139383963323764326162373133383739306233333239 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit: BPF prog-id=153 op=LOAD Feb 12 22:15:26.686000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fe720 items=0 ppid=3708 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663634323139383963323764326162373133383739306233333239 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit: BPF prog-id=154 op=LOAD Feb 12 22:15:26.686000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fe768 items=0 ppid=3708 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663634323139383963323764326162373133383739306233333239 Feb 12 22:15:26.686000 audit: BPF prog-id=154 op=UNLOAD Feb 12 22:15:26.686000 audit: BPF prog-id=153 op=UNLOAD Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.686000 audit: BPF prog-id=155 op=LOAD Feb 12 22:15:26.686000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001feb78 items=0 ppid=3708 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165663634323139383963323764326162373133383739306233333239 Feb 12 22:15:26.687568 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:15:26.689884 env[1161]: time="2024-02-12T22:15:26.689804269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-x922s,Uid:ba9e8d56-d1ac-43ad-a596-f39c3905f185,Namespace:kube-system,Attempt:1,} returns sandbox id \"9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0\"" Feb 12 22:15:26.691405 env[1161]: time="2024-02-12T22:15:26.691375841Z" level=info msg="CreateContainer within sandbox \"9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:15:26.702357 env[1161]: time="2024-02-12T22:15:26.702320817Z" level=info msg="CreateContainer within sandbox \"9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"11bdf50d0c36293f021c3e51bd906d5b3fa1a847636eba4a1e2d56c3112cbe8b\"" Feb 12 22:15:26.702820 env[1161]: time="2024-02-12T22:15:26.702804389Z" level=info msg="StartContainer for \"11bdf50d0c36293f021c3e51bd906d5b3fa1a847636eba4a1e2d56c3112cbe8b\"" Feb 12 22:15:26.711666 systemd[1]: Started cri-containerd-11bdf50d0c36293f021c3e51bd906d5b3fa1a847636eba4a1e2d56c3112cbe8b.scope. Feb 12 22:15:26.721185 env[1161]: time="2024-02-12T22:15:26.721163219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6fb6955f4-hqlg9,Uid:89bf2018-6132-4f18-acae-ca2347433bab,Namespace:calico-system,Attempt:1,} returns sandbox id \"aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326\"" Feb 12 22:15:26.722162 env[1161]: time="2024-02-12T22:15:26.722149897Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit: BPF prog-id=156 op=LOAD Feb 12 22:15:26.725000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.725000 audit[3764]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3675 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131626466353064306333363239336630323163336535316264393036 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3675 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131626466353064306333363239336630323163336535316264393036 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit: BPF prog-id=157 op=LOAD Feb 12 22:15:26.726000 audit[3764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020ff60 items=0 ppid=3675 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131626466353064306333363239336630323163336535316264393036 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit: BPF prog-id=158 op=LOAD Feb 12 22:15:26.726000 audit[3764]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020ffa8 items=0 ppid=3675 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131626466353064306333363239336630323163336535316264393036 Feb 12 22:15:26.726000 audit: BPF prog-id=158 op=UNLOAD Feb 12 22:15:26.726000 audit: BPF prog-id=157 op=UNLOAD Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { perfmon } for pid=3764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit[3764]: AVC avc: denied { bpf } for pid=3764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:26.726000 audit: BPF prog-id=159 op=LOAD Feb 12 22:15:26.726000 audit[3764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004143b8 items=0 ppid=3675 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:26.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131626466353064306333363239336630323163336535316264393036 Feb 12 22:15:26.738589 env[1161]: time="2024-02-12T22:15:26.738568278Z" level=info msg="StartContainer for \"11bdf50d0c36293f021c3e51bd906d5b3fa1a847636eba4a1e2d56c3112cbe8b\" returns successfully" Feb 12 22:15:27.205846 env[1161]: time="2024-02-12T22:15:27.205809211Z" level=info msg="StopPodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\"" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.234 [INFO][3836] k8s.go 578: Cleaning up netns ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.234 [INFO][3836] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" iface="eth0" netns="/var/run/netns/cni-d2aa8dff-e889-25eb-8232-9fc313c3d216" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.235 [INFO][3836] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" iface="eth0" netns="/var/run/netns/cni-d2aa8dff-e889-25eb-8232-9fc313c3d216" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.235 [INFO][3836] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" iface="eth0" netns="/var/run/netns/cni-d2aa8dff-e889-25eb-8232-9fc313c3d216" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.235 [INFO][3836] k8s.go 585: Releasing IP address(es) ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.235 [INFO][3836] utils.go 188: Calico CNI releasing IP address ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.251 [INFO][3842] ipam_plugin.go 415: Releasing address using handleID ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.252 [INFO][3842] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.252 [INFO][3842] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.256 [WARNING][3842] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.256 [INFO][3842] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.256 [INFO][3842] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:27.258555 env[1161]: 2024-02-12 22:15:27.257 [INFO][3836] k8s.go 591: Teardown processing complete. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:27.260822 env[1161]: time="2024-02-12T22:15:27.260499517Z" level=info msg="TearDown network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" successfully" Feb 12 22:15:27.260822 env[1161]: time="2024-02-12T22:15:27.260547151Z" level=info msg="StopPodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" returns successfully" Feb 12 22:15:27.259963 systemd[1]: run-netns-cni\x2dd2aa8dff\x2de889\x2d25eb\x2d8232\x2d9fc313c3d216.mount: Deactivated successfully. Feb 12 22:15:27.261204 env[1161]: time="2024-02-12T22:15:27.261185601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hsbwn,Uid:b1d4a8b2-7626-4b49-927f-6d4573ba6436,Namespace:calico-system,Attempt:1,}" Feb 12 22:15:27.272857 kubelet[2213]: I0212 22:15:27.272836 2213 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:15:27.356791 kubelet[2213]: I0212 22:15:27.356770 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-x922s" podStartSLOduration=34.356723043 pod.CreationTimestamp="2024-02-12 22:14:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:15:27.348253955 +0000 UTC m=+47.269945486" watchObservedRunningTime="2024-02-12 22:15:27.356723043 +0000 UTC m=+47.278414573" Feb 12 22:15:27.371128 systemd-networkd[1062]: cali142780f0aa6: Link UP Feb 12 22:15:27.372366 systemd-networkd[1062]: cali142780f0aa6: Gained carrier Feb 12 22:15:27.372843 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali142780f0aa6: link becomes ready Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.283 [INFO][3848] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.294 [INFO][3848] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--hsbwn-eth0 csi-node-driver- calico-system b1d4a8b2-7626-4b49-927f-6d4573ba6436 692 0 2024-02-12 22:14:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-hsbwn eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali142780f0aa6 [] []}} ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.295 [INFO][3848] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.327 [INFO][3859] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" HandleID="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.335 [INFO][3859] ipam_plugin.go 268: Auto assigning IP ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" HandleID="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-hsbwn", "timestamp":"2024-02-12 22:15:27.327794741 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.335 [INFO][3859] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.335 [INFO][3859] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.335 [INFO][3859] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.336 [INFO][3859] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.343 [INFO][3859] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.350 [INFO][3859] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.351 [INFO][3859] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.355 [INFO][3859] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.355 [INFO][3859] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.358 [INFO][3859] ipam.go 1682: Creating new handle: k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.362 [INFO][3859] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.367 [INFO][3859] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.368 [INFO][3859] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" host="localhost" Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.368 [INFO][3859] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:27.383304 env[1161]: 2024-02-12 22:15:27.368 [INFO][3859] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" HandleID="k8s-pod-network.27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.383852 env[1161]: 2024-02-12 22:15:27.369 [INFO][3848] k8s.go 385: Populated endpoint ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hsbwn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1d4a8b2-7626-4b49-927f-6d4573ba6436", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-hsbwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali142780f0aa6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:27.383852 env[1161]: 2024-02-12 22:15:27.369 [INFO][3848] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.383852 env[1161]: 2024-02-12 22:15:27.369 [INFO][3848] dataplane_linux.go 68: Setting the host side veth name to cali142780f0aa6 ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.383852 env[1161]: 2024-02-12 22:15:27.376 [INFO][3848] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.383852 env[1161]: 2024-02-12 22:15:27.376 [INFO][3848] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hsbwn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1d4a8b2-7626-4b49-927f-6d4573ba6436", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e", Pod:"csi-node-driver-hsbwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali142780f0aa6", MAC:"6a:2c:80:bc:c7:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:27.383852 env[1161]: 2024-02-12 22:15:27.382 [INFO][3848] k8s.go 491: Wrote updated endpoint to datastore ContainerID="27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e" Namespace="calico-system" Pod="csi-node-driver-hsbwn" WorkloadEndpoint="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:27.389000 audit[3902]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:27.389000 audit[3902]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffeb06ee900 a2=0 a3=7ffeb06ee8ec items=0 ppid=2389 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:27.394419 env[1161]: time="2024-02-12T22:15:27.391329938Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:15:27.394419 env[1161]: time="2024-02-12T22:15:27.391354631Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:15:27.394419 env[1161]: time="2024-02-12T22:15:27.391361640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:15:27.394419 env[1161]: time="2024-02-12T22:15:27.391458580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e pid=3910 runtime=io.containerd.runc.v2 Feb 12 22:15:27.394000 audit[3902]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:27.394000 audit[3902]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffeb06ee900 a2=0 a3=7ffeb06ee8ec items=0 ppid=2389 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:27.400822 systemd[1]: Started cri-containerd-27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e.scope. Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.411000 audit: BPF prog-id=160 op=LOAD Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3910 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237643966323136326434646366356133306133663761643834346337 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3910 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237643966323136326434646366356133306133663761643834346337 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit: BPF prog-id=161 op=LOAD Feb 12 22:15:27.412000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000347dc0 items=0 ppid=3910 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237643966323136326434646366356133306133663761643834346337 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit: BPF prog-id=162 op=LOAD Feb 12 22:15:27.412000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000347e08 items=0 ppid=3910 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237643966323136326434646366356133306133663761643834346337 Feb 12 22:15:27.412000 audit: BPF prog-id=162 op=UNLOAD Feb 12 22:15:27.412000 audit: BPF prog-id=161 op=UNLOAD Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:27.412000 audit: BPF prog-id=163 op=LOAD Feb 12 22:15:27.412000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000394218 items=0 ppid=3910 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237643966323136326434646366356133306133663761643834346337 Feb 12 22:15:27.415235 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:15:27.421758 env[1161]: time="2024-02-12T22:15:27.421734751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hsbwn,Uid:b1d4a8b2-7626-4b49-927f-6d4573ba6436,Namespace:calico-system,Attempt:1,} returns sandbox id \"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e\"" Feb 12 22:15:27.427000 audit[3968]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:27.427000 audit[3968]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcc80bbd80 a2=0 a3=7ffcc80bbd6c items=0 ppid=2389 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:27.428000 audit[3968]: NETFILTER_CFG table=nat:112 family=2 entries=51 op=nft_register_chain pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:27.428000 audit[3968]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffcc80bbd80 a2=0 a3=7ffcc80bbd6c items=0 ppid=2389 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:27.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:27.916909 systemd-networkd[1062]: calia62b538b3ba: Gained IPv6LL Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit: BPF prog-id=164 op=LOAD Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd020e990 a2=70 a3=7fdb822a4000 items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.107000 audit: BPF prog-id=164 op=UNLOAD Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit: BPF prog-id=165 op=LOAD Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd020e990 a2=70 a3=6e items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.107000 audit: BPF prog-id=165 op=UNLOAD Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd020e940 a2=70 a3=7ffdd020e990 items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit: BPF prog-id=166 op=LOAD Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdd020e920 a2=70 a3=7ffdd020e990 items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.107000 audit: BPF prog-id=166 op=UNLOAD Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd020ea00 a2=70 a3=0 items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd020e9f0 a2=70 a3=0 items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.107000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.107000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdd020ea30 a2=70 a3=0 items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.108000 audit: BPF prog-id=167 op=LOAD Feb 12 22:15:28.108000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdd020e950 a2=70 a3=ffffffff items=0 ppid=3972 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:15:28.132000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.132000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc4a30edd0 a2=70 a3=fff80800 items=0 ppid=3972 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:15:28.132000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.132000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc4a30eca0 a2=70 a3=3 items=0 ppid=3972 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:15:28.148000 audit: BPF prog-id=167 op=UNLOAD Feb 12 22:15:28.207554 env[1161]: time="2024-02-12T22:15:28.205709876Z" level=info msg="StopPodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\"" Feb 12 22:15:28.222000 audit[4107]: NETFILTER_CFG table=mangle:113 family=2 entries=19 op=nft_register_chain pid=4107 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:15:28.222000 audit[4107]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd948040a0 a2=0 a3=7ffd9480408c items=0 ppid=3972 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.222000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:15:28.224000 audit[4088]: NETFILTER_CFG table=filter:114 family=2 entries=129 op=nft_register_chain pid=4088 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:15:28.224000 audit[4088]: SYSCALL arch=c000003e syscall=46 success=yes exit=70188 a0=3 a1=7ffccd6c41b0 a2=0 a3=557577d92000 items=0 ppid=3972 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.224000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:15:28.226000 audit[4087]: NETFILTER_CFG table=raw:115 family=2 entries=19 op=nft_register_chain pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:15:28.226000 audit[4087]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc5af61000 a2=0 a3=559598804000 items=0 ppid=3972 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:15:28.228000 audit[4108]: NETFILTER_CFG table=nat:116 family=2 entries=16 op=nft_register_chain pid=4108 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:15:28.228000 audit[4108]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffec3acd160 a2=0 a3=55fa0dd73000 items=0 ppid=3972 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.228000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:15:28.243131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1897887326.mount: Deactivated successfully. Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.252 [INFO][4103] k8s.go 578: Cleaning up netns ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.252 [INFO][4103] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" iface="eth0" netns="/var/run/netns/cni-c5b767a4-4657-cdac-b16d-fd663907c0bc" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.252 [INFO][4103] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" iface="eth0" netns="/var/run/netns/cni-c5b767a4-4657-cdac-b16d-fd663907c0bc" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.252 [INFO][4103] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" iface="eth0" netns="/var/run/netns/cni-c5b767a4-4657-cdac-b16d-fd663907c0bc" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.252 [INFO][4103] k8s.go 585: Releasing IP address(es) ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.252 [INFO][4103] utils.go 188: Calico CNI releasing IP address ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.264 [INFO][4119] ipam_plugin.go 415: Releasing address using handleID ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.264 [INFO][4119] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.264 [INFO][4119] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.268 [WARNING][4119] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.268 [INFO][4119] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.268 [INFO][4119] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:28.270887 env[1161]: 2024-02-12 22:15:28.269 [INFO][4103] k8s.go 591: Teardown processing complete. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:28.273276 env[1161]: time="2024-02-12T22:15:28.272533012Z" level=info msg="TearDown network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" successfully" Feb 12 22:15:28.273276 env[1161]: time="2024-02-12T22:15:28.272557979Z" level=info msg="StopPodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" returns successfully" Feb 12 22:15:28.273276 env[1161]: time="2024-02-12T22:15:28.273054436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hpk45,Uid:751b31f7-2085-4b5f-97c2-eebc174ff7de,Namespace:kube-system,Attempt:1,}" Feb 12 22:15:28.272153 systemd[1]: run-netns-cni\x2dc5b767a4\x2d4657\x2dcdac\x2db16d\x2dfd663907c0bc.mount: Deactivated successfully. Feb 12 22:15:28.346017 systemd-networkd[1062]: cali7d913a0b8f3: Link UP Feb 12 22:15:28.348339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7d913a0b8f3: link becomes ready Feb 12 22:15:28.347439 systemd-networkd[1062]: cali7d913a0b8f3: Gained carrier Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.295 [INFO][4125] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--787d4945fb--hpk45-eth0 coredns-787d4945fb- kube-system 751b31f7-2085-4b5f-97c2-eebc174ff7de 714 0 2024-02-12 22:14:53 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-787d4945fb-hpk45 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7d913a0b8f3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.296 [INFO][4125] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.318 [INFO][4137] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" HandleID="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.325 [INFO][4137] ipam_plugin.go 268: Auto assigning IP ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" HandleID="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291eb0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-787d4945fb-hpk45", "timestamp":"2024-02-12 22:15:28.318802381 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.325 [INFO][4137] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.325 [INFO][4137] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.325 [INFO][4137] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.326 [INFO][4137] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.328 [INFO][4137] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.331 [INFO][4137] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.332 [INFO][4137] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.333 [INFO][4137] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.333 [INFO][4137] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.334 [INFO][4137] ipam.go 1682: Creating new handle: k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.336 [INFO][4137] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.339 [INFO][4137] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.339 [INFO][4137] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" host="localhost" Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.339 [INFO][4137] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:28.361534 env[1161]: 2024-02-12 22:15:28.339 [INFO][4137] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" HandleID="k8s-pod-network.caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.362046 env[1161]: 2024-02-12 22:15:28.342 [INFO][4125] k8s.go 385: Populated endpoint ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--hpk45-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"751b31f7-2085-4b5f-97c2-eebc174ff7de", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-787d4945fb-hpk45", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d913a0b8f3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:28.362046 env[1161]: 2024-02-12 22:15:28.342 [INFO][4125] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.362046 env[1161]: 2024-02-12 22:15:28.342 [INFO][4125] dataplane_linux.go 68: Setting the host side veth name to cali7d913a0b8f3 ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.362046 env[1161]: 2024-02-12 22:15:28.349 [INFO][4125] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.362046 env[1161]: 2024-02-12 22:15:28.349 [INFO][4125] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--hpk45-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"751b31f7-2085-4b5f-97c2-eebc174ff7de", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c", Pod:"coredns-787d4945fb-hpk45", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d913a0b8f3", MAC:"82:7e:7d:7a:9d:d2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:28.362046 env[1161]: 2024-02-12 22:15:28.359 [INFO][4125] k8s.go 491: Wrote updated endpoint to datastore ContainerID="caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c" Namespace="kube-system" Pod="coredns-787d4945fb-hpk45" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:28.369019 env[1161]: time="2024-02-12T22:15:28.368971034Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:15:28.369113 env[1161]: time="2024-02-12T22:15:28.369087813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:15:28.369181 env[1161]: time="2024-02-12T22:15:28.369103114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:15:28.369371 env[1161]: time="2024-02-12T22:15:28.369345239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c pid=4162 runtime=io.containerd.runc.v2 Feb 12 22:15:28.377247 systemd[1]: Started cri-containerd-caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c.scope. Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit: BPF prog-id=168 op=LOAD Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4162 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656563613638393830323734383336313531623730646538623339 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4162 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656563613638393830323734383336313531623730646538623339 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit: BPF prog-id=169 op=LOAD Feb 12 22:15:28.386000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ea000 items=0 ppid=4162 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656563613638393830323734383336313531623730646538623339 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.386000 audit: BPF prog-id=170 op=LOAD Feb 12 22:15:28.386000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ea048 items=0 ppid=4162 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656563613638393830323734383336313531623730646538623339 Feb 12 22:15:28.386000 audit: BPF prog-id=170 op=UNLOAD Feb 12 22:15:28.387000 audit: BPF prog-id=169 op=UNLOAD Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.387000 audit: BPF prog-id=171 op=LOAD Feb 12 22:15:28.387000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ea458 items=0 ppid=4162 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361656563613638393830323734383336313531623730646538623339 Feb 12 22:15:28.388365 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:15:28.413674 env[1161]: time="2024-02-12T22:15:28.413642304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hpk45,Uid:751b31f7-2085-4b5f-97c2-eebc174ff7de,Namespace:kube-system,Attempt:1,} returns sandbox id \"caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c\"" Feb 12 22:15:28.416276 env[1161]: time="2024-02-12T22:15:28.416259965Z" level=info msg="CreateContainer within sandbox \"caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:15:28.421000 audit[4200]: NETFILTER_CFG table=filter:117 family=2 entries=38 op=nft_register_chain pid=4200 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:15:28.421000 audit[4200]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffc05c19510 a2=0 a3=7ffc05c194fc items=0 ppid=3972 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:15:28.427656 env[1161]: time="2024-02-12T22:15:28.427625961Z" level=info msg="CreateContainer within sandbox \"caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cc7240f1f23b09a617f38dce89fd045695a93049165a89a78d0ab53926a9a9f7\"" Feb 12 22:15:28.428027 env[1161]: time="2024-02-12T22:15:28.428009702Z" level=info msg="StartContainer for \"cc7240f1f23b09a617f38dce89fd045695a93049165a89a78d0ab53926a9a9f7\"" Feb 12 22:15:28.436937 systemd[1]: Started cri-containerd-cc7240f1f23b09a617f38dce89fd045695a93049165a89a78d0ab53926a9a9f7.scope. Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit: BPF prog-id=172 op=LOAD Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4162 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373234306631663233623039613631376633386463653839666430 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4162 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373234306631663233623039613631376633386463653839666430 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.447000 audit: BPF prog-id=173 op=LOAD Feb 12 22:15:28.447000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002aaae0 items=0 ppid=4162 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373234306631663233623039613631376633386463653839666430 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit: BPF prog-id=174 op=LOAD Feb 12 22:15:28.448000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002aab28 items=0 ppid=4162 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373234306631663233623039613631376633386463653839666430 Feb 12 22:15:28.448000 audit: BPF prog-id=174 op=UNLOAD Feb 12 22:15:28.448000 audit: BPF prog-id=173 op=UNLOAD Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:28.448000 audit: BPF prog-id=175 op=LOAD Feb 12 22:15:28.448000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002aaf38 items=0 ppid=4162 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:28.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373234306631663233623039613631376633386463653839666430 Feb 12 22:15:28.456734 env[1161]: time="2024-02-12T22:15:28.456706180Z" level=info msg="StartContainer for \"cc7240f1f23b09a617f38dce89fd045695a93049165a89a78d0ab53926a9a9f7\" returns successfully" Feb 12 22:15:28.620973 systemd-networkd[1062]: cali36a5a34e16b: Gained IPv6LL Feb 12 22:15:28.979616 systemd-networkd[1062]: vxlan.calico: Link UP Feb 12 22:15:28.979621 systemd-networkd[1062]: vxlan.calico: Gained carrier Feb 12 22:15:29.197014 systemd-networkd[1062]: cali142780f0aa6: Gained IPv6LL Feb 12 22:15:29.410000 audit[4266]: NETFILTER_CFG table=filter:118 family=2 entries=6 op=nft_register_rule pid=4266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:29.410000 audit[4266]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd49cefd60 a2=0 a3=7ffd49cefd4c items=0 ppid=2389 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:29.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:29.411000 audit[4266]: NETFILTER_CFG table=nat:119 family=2 entries=60 op=nft_register_rule pid=4266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:29.411000 audit[4266]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffd49cefd60 a2=0 a3=7ffd49cefd4c items=0 ppid=2389 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:29.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:29.581007 systemd-networkd[1062]: cali7d913a0b8f3: Gained IPv6LL Feb 12 22:15:30.193790 env[1161]: time="2024-02-12T22:15:30.193760004Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:30.194476 env[1161]: time="2024-02-12T22:15:30.194460146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:30.195765 env[1161]: time="2024-02-12T22:15:30.195751038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:30.196933 env[1161]: time="2024-02-12T22:15:30.196920643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:30.197279 env[1161]: time="2024-02-12T22:15:30.197260737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 22:15:30.197603 env[1161]: time="2024-02-12T22:15:30.197591395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 22:15:30.211195 env[1161]: time="2024-02-12T22:15:30.211167694Z" level=info msg="CreateContainer within sandbox \"aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 22:15:30.216800 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1782412497.mount: Deactivated successfully. Feb 12 22:15:30.218838 env[1161]: time="2024-02-12T22:15:30.218799238Z" level=info msg="CreateContainer within sandbox \"aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e\"" Feb 12 22:15:30.220258 env[1161]: time="2024-02-12T22:15:30.220240270Z" level=info msg="StartContainer for \"99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e\"" Feb 12 22:15:30.236605 systemd[1]: Started cri-containerd-99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e.scope. Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.251000 audit: BPF prog-id=176 op=LOAD Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3708 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333937653765663734383966663635366433616661313463323135 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3708 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333937653765663734383966663635366433616661313463323135 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit: BPF prog-id=177 op=LOAD Feb 12 22:15:30.252000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000365de0 items=0 ppid=3708 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333937653765663734383966663635366433616661313463323135 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit: BPF prog-id=178 op=LOAD Feb 12 22:15:30.252000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000365e28 items=0 ppid=3708 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333937653765663734383966663635366433616661313463323135 Feb 12 22:15:30.252000 audit: BPF prog-id=178 op=UNLOAD Feb 12 22:15:30.252000 audit: BPF prog-id=177 op=UNLOAD Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:30.252000 audit: BPF prog-id=179 op=LOAD Feb 12 22:15:30.252000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003cc238 items=0 ppid=3708 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939333937653765663734383966663635366433616661313463323135 Feb 12 22:15:30.274704 env[1161]: time="2024-02-12T22:15:30.274681005Z" level=info msg="StartContainer for \"99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e\" returns successfully" Feb 12 22:15:30.355745 kubelet[2213]: I0212 22:15:30.355717 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-hpk45" podStartSLOduration=37.355694681 pod.CreationTimestamp="2024-02-12 22:14:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:15:29.355819504 +0000 UTC m=+49.277511034" watchObservedRunningTime="2024-02-12 22:15:30.355694681 +0000 UTC m=+50.277386212" Feb 12 22:15:30.362907 kubelet[2213]: I0212 22:15:30.362889 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6fb6955f4-hqlg9" podStartSLOduration=-9.22337200449191e+09 pod.CreationTimestamp="2024-02-12 22:14:58 +0000 UTC" firstStartedPulling="2024-02-12 22:15:26.721823934 +0000 UTC m=+46.643515460" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:15:30.356330373 +0000 UTC m=+50.278021903" watchObservedRunningTime="2024-02-12 22:15:30.362865661 +0000 UTC m=+50.284557199" Feb 12 22:15:30.443000 audit[4350]: NETFILTER_CFG table=filter:120 family=2 entries=6 op=nft_register_rule pid=4350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:30.443000 audit[4350]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffed7cd2380 a2=0 a3=7ffed7cd236c items=0 ppid=2389 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:30.524000 audit[4350]: NETFILTER_CFG table=nat:121 family=2 entries=72 op=nft_register_chain pid=4350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:30.524000 audit[4350]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffed7cd2380 a2=0 a3=7ffed7cd236c items=0 ppid=2389 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:30.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:30.797035 systemd-networkd[1062]: vxlan.calico: Gained IPv6LL Feb 12 22:15:31.847942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount585997614.mount: Deactivated successfully. Feb 12 22:15:32.423490 env[1161]: time="2024-02-12T22:15:32.423452795Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:32.424174 env[1161]: time="2024-02-12T22:15:32.424158067Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:32.424966 env[1161]: time="2024-02-12T22:15:32.424952471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:32.425770 env[1161]: time="2024-02-12T22:15:32.425754277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:32.426185 env[1161]: time="2024-02-12T22:15:32.426167541Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 22:15:32.428654 env[1161]: time="2024-02-12T22:15:32.428634560Z" level=info msg="CreateContainer within sandbox \"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 22:15:32.435566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1066397944.mount: Deactivated successfully. Feb 12 22:15:32.451538 env[1161]: time="2024-02-12T22:15:32.451508978Z" level=info msg="CreateContainer within sandbox \"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1d96a4da5697a031191329667c3eec9bc21c354e7fc4eebf16f0db0d8b4e9529\"" Feb 12 22:15:32.451961 env[1161]: time="2024-02-12T22:15:32.451942853Z" level=info msg="StartContainer for \"1d96a4da5697a031191329667c3eec9bc21c354e7fc4eebf16f0db0d8b4e9529\"" Feb 12 22:15:32.464908 systemd[1]: Started cri-containerd-1d96a4da5697a031191329667c3eec9bc21c354e7fc4eebf16f0db0d8b4e9529.scope. Feb 12 22:15:32.486425 kernel: kauditd_printk_skb: 499 callbacks suppressed Feb 12 22:15:32.486499 kernel: audit: type=1400 audit(1707776132.478:1310): avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.486521 kernel: audit: type=1300 audit(1707776132.478:1310): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fde985905a8 items=0 ppid=3910 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fde985905a8 items=0 ppid=3910 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:32.490966 kernel: audit: type=1327 audit(1707776132.478:1310): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393661346461353639376130333131393133323936363763336565 Feb 12 22:15:32.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393661346461353639376130333131393133323936363763336565 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.493868 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.498083 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.500848 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.507548 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.507589 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.511195 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.513725 kernel: audit: type=1400 audit(1707776132.478:1311): avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.513855 env[1161]: time="2024-02-12T22:15:32.513810122Z" level=info msg="StartContainer for \"1d96a4da5697a031191329667c3eec9bc21c354e7fc4eebf16f0db0d8b4e9529\" returns successfully" Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.478000 audit: BPF prog-id=180 op=LOAD Feb 12 22:15:32.478000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d7b98 items=0 ppid=3910 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:32.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393661346461353639376130333131393133323936363763336565 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.482000 audit: BPF prog-id=181 op=LOAD Feb 12 22:15:32.482000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d7be8 items=0 ppid=3910 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:32.515747 env[1161]: time="2024-02-12T22:15:32.515733716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 22:15:32.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393661346461353639376130333131393133323936363763336565 Feb 12 22:15:32.485000 audit: BPF prog-id=181 op=UNLOAD Feb 12 22:15:32.485000 audit: BPF prog-id=180 op=UNLOAD Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:32.485000 audit: BPF prog-id=182 op=LOAD Feb 12 22:15:32.485000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d7c78 items=0 ppid=3910 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:32.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393661346461353639376130333131393133323936363763336565 Feb 12 22:15:34.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.100:22-14.102.74.99:46818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:34.331979 systemd[1]: Started sshd@28-139.178.70.100:22-14.102.74.99:46818.service. Feb 12 22:15:34.632730 env[1161]: time="2024-02-12T22:15:34.632663814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:34.633643 env[1161]: time="2024-02-12T22:15:34.633631421Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:34.634559 env[1161]: time="2024-02-12T22:15:34.634547629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:34.635338 env[1161]: time="2024-02-12T22:15:34.635326140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:15:34.635745 env[1161]: time="2024-02-12T22:15:34.635730568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 22:15:34.637125 env[1161]: time="2024-02-12T22:15:34.636959978Z" level=info msg="CreateContainer within sandbox \"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 22:15:34.648102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2291777968.mount: Deactivated successfully. Feb 12 22:15:34.655271 env[1161]: time="2024-02-12T22:15:34.651226745Z" level=info msg="CreateContainer within sandbox \"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"96d63c382e370ffed6d18d6f8ae4c9af23fef1ec897d87f5b0cedcd80e97afea\"" Feb 12 22:15:34.655494 env[1161]: time="2024-02-12T22:15:34.655479841Z" level=info msg="StartContainer for \"96d63c382e370ffed6d18d6f8ae4c9af23fef1ec897d87f5b0cedcd80e97afea\"" Feb 12 22:15:34.674195 systemd[1]: Started cri-containerd-96d63c382e370ffed6d18d6f8ae4c9af23fef1ec897d87f5b0cedcd80e97afea.scope. Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb6e56f7698 items=0 ppid=3910 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:34.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643633633338326533373066666564366431386436663861653463 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit: BPF prog-id=183 op=LOAD Feb 12 22:15:34.684000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027e298 items=0 ppid=3910 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:34.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643633633338326533373066666564366431386436663861653463 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit: BPF prog-id=184 op=LOAD Feb 12 22:15:34.684000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027e2e8 items=0 ppid=3910 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:34.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643633633338326533373066666564366431386436663861653463 Feb 12 22:15:34.684000 audit: BPF prog-id=184 op=UNLOAD Feb 12 22:15:34.684000 audit: BPF prog-id=183 op=UNLOAD Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:34.684000 audit: BPF prog-id=185 op=LOAD Feb 12 22:15:34.684000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027e378 items=0 ppid=3910 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:34.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643633633338326533373066666564366431386436663861653463 Feb 12 22:15:34.692886 env[1161]: time="2024-02-12T22:15:34.692861157Z" level=info msg="StartContainer for \"96d63c382e370ffed6d18d6f8ae4c9af23fef1ec897d87f5b0cedcd80e97afea\" returns successfully" Feb 12 22:15:35.272540 kubelet[2213]: I0212 22:15:35.272523 2213 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 22:15:35.272797 kubelet[2213]: I0212 22:15:35.272790 2213 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 22:15:35.367234 kubelet[2213]: I0212 22:15:35.367197 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-hsbwn" podStartSLOduration=-9.223371999487608e+09 pod.CreationTimestamp="2024-02-12 22:14:58 +0000 UTC" firstStartedPulling="2024-02-12 22:15:27.422449524 +0000 UTC m=+47.344141050" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:15:35.365898905 +0000 UTC m=+55.287590449" watchObservedRunningTime="2024-02-12 22:15:35.367167414 +0000 UTC m=+55.288858951" Feb 12 22:15:35.646667 systemd[1]: run-containerd-runc-k8s.io-96d63c382e370ffed6d18d6f8ae4c9af23fef1ec897d87f5b0cedcd80e97afea-runc.Tzphx4.mount: Deactivated successfully. Feb 12 22:15:35.866759 sshd[4394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99 user=root Feb 12 22:15:35.866000 audit[4394]: USER_AUTH pid=4394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.102.74.99 addr=14.102.74.99 terminal=ssh res=failed' Feb 12 22:15:36.821000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:36.821000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e1a240 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:36.821000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:36.821000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:36.821000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f8f290 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:36.821000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:37.349000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6507 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:37.349000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:37.349000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0106c7300 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:15:37.349000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004017d70 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:15:37.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:15:37.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:15:37.350000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6513 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:37.350000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00ba467b0 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:15:37.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:15:37.350000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:37.350000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00ba46810 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:15:37.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:15:37.359000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:37.359000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00efe7bc0 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:15:37.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:15:37.360000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:37.360000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ba46c30 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:15:37.360000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:15:38.093578 sshd[4394]: Failed password for root from 14.102.74.99 port 46818 ssh2 Feb 12 22:15:38.506996 kernel: kauditd_printk_skb: 102 callbacks suppressed Feb 12 22:15:38.510616 kernel: audit: type=1130 audit(1707776138.504:1332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.100:22-187.190.112.180:12944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:38.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.100:22-187.190.112.180:12944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:38.505565 systemd[1]: Started sshd@29-139.178.70.100:22-187.190.112.180:12944.service. Feb 12 22:15:38.988810 sshd[4446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.112.180 user=root Feb 12 22:15:38.988000 audit[4446]: USER_AUTH pid=4446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=187.190.112.180 addr=187.190.112.180 terminal=ssh res=failed' Feb 12 22:15:38.993964 kernel: audit: type=1100 audit(1707776138.988:1333): pid=4446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=187.190.112.180 addr=187.190.112.180 terminal=ssh res=failed' Feb 12 22:15:39.561390 sshd[4394]: Received disconnect from 14.102.74.99 port 46818:11: Bye Bye [preauth] Feb 12 22:15:39.561390 sshd[4394]: Disconnected from authenticating user root 14.102.74.99 port 46818 [preauth] Feb 12 22:15:39.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.100:22-14.102.74.99:46818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:39.562403 systemd[1]: sshd@28-139.178.70.100:22-14.102.74.99:46818.service: Deactivated successfully. Feb 12 22:15:39.567852 kernel: audit: type=1131 audit(1707776139.560:1334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.100:22-14.102.74.99:46818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:40.189122 env[1161]: time="2024-02-12T22:15:40.189078441Z" level=info msg="StopPodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\"" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.262 [WARNING][4464] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--hpk45-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"751b31f7-2085-4b5f-97c2-eebc174ff7de", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c", Pod:"coredns-787d4945fb-hpk45", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d913a0b8f3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.262 [INFO][4464] k8s.go 578: Cleaning up netns ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.262 [INFO][4464] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" iface="eth0" netns="" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.262 [INFO][4464] k8s.go 585: Releasing IP address(es) ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.262 [INFO][4464] utils.go 188: Calico CNI releasing IP address ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.284 [INFO][4472] ipam_plugin.go 415: Releasing address using handleID ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.284 [INFO][4472] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.284 [INFO][4472] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.288 [WARNING][4472] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.288 [INFO][4472] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.289 [INFO][4472] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.291653 env[1161]: 2024-02-12 22:15:40.290 [INFO][4464] k8s.go 591: Teardown processing complete. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.292032 env[1161]: time="2024-02-12T22:15:40.291668251Z" level=info msg="TearDown network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" successfully" Feb 12 22:15:40.292032 env[1161]: time="2024-02-12T22:15:40.291687878Z" level=info msg="StopPodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" returns successfully" Feb 12 22:15:40.292120 env[1161]: time="2024-02-12T22:15:40.292101337Z" level=info msg="RemovePodSandbox for \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\"" Feb 12 22:15:40.292157 env[1161]: time="2024-02-12T22:15:40.292123725Z" level=info msg="Forcibly stopping sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\"" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.332 [WARNING][4490] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--hpk45-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"751b31f7-2085-4b5f-97c2-eebc174ff7de", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"caeeca68980274836151b70de8b394b2880f87f5354fc4d16cdd17d3b546163c", Pod:"coredns-787d4945fb-hpk45", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d913a0b8f3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.332 [INFO][4490] k8s.go 578: Cleaning up netns ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.332 [INFO][4490] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" iface="eth0" netns="" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.332 [INFO][4490] k8s.go 585: Releasing IP address(es) ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.332 [INFO][4490] utils.go 188: Calico CNI releasing IP address ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.347 [INFO][4496] ipam_plugin.go 415: Releasing address using handleID ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.347 [INFO][4496] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.347 [INFO][4496] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.351 [WARNING][4496] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.351 [INFO][4496] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" HandleID="k8s-pod-network.b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Workload="localhost-k8s-coredns--787d4945fb--hpk45-eth0" Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.352 [INFO][4496] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.353962 env[1161]: 2024-02-12 22:15:40.353 [INFO][4490] k8s.go 591: Teardown processing complete. ContainerID="b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e" Feb 12 22:15:40.355432 env[1161]: time="2024-02-12T22:15:40.354333185Z" level=info msg="TearDown network for sandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" successfully" Feb 12 22:15:40.356138 env[1161]: time="2024-02-12T22:15:40.356124572Z" level=info msg="RemovePodSandbox \"b6d97898b522e42ed91546991d6ebe0fe37f3263e169e61e0e630b14076d473e\" returns successfully" Feb 12 22:15:40.356509 env[1161]: time="2024-02-12T22:15:40.356491349Z" level=info msg="StopPodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\"" Feb 12 22:15:40.412000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.412000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f924c0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:40.423668 kernel: audit: type=1400 audit(1707776140.412:1335): avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.423707 kernel: audit: type=1300 audit(1707776140.412:1335): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f924c0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:40.423762 kernel: audit: type=1327 audit(1707776140.412:1335): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:40.423786 kernel: audit: type=1400 audit(1707776140.412:1336): avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:40.412000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.412000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f924e0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:40.430708 kernel: audit: type=1300 audit(1707776140.412:1336): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f924e0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:40.430853 kernel: audit: type=1327 audit(1707776140.412:1336): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:40.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.382 [WARNING][4514] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0", GenerateName:"calico-kube-controllers-6fb6955f4-", Namespace:"calico-system", SelfLink:"", UID:"89bf2018-6132-4f18-acae-ca2347433bab", ResourceVersion:"740", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6fb6955f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326", Pod:"calico-kube-controllers-6fb6955f4-hqlg9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali36a5a34e16b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.383 [INFO][4514] k8s.go 578: Cleaning up netns ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.383 [INFO][4514] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" iface="eth0" netns="" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.383 [INFO][4514] k8s.go 585: Releasing IP address(es) ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.383 [INFO][4514] utils.go 188: Calico CNI releasing IP address ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.399 [INFO][4521] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.399 [INFO][4521] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.399 [INFO][4521] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.407 [WARNING][4521] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.407 [INFO][4521] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.407 [INFO][4521] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.434944 env[1161]: 2024-02-12 22:15:40.423 [INFO][4514] k8s.go 591: Teardown processing complete. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.435784 env[1161]: time="2024-02-12T22:15:40.435762499Z" level=info msg="TearDown network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" successfully" Feb 12 22:15:40.435842 env[1161]: time="2024-02-12T22:15:40.435823220Z" level=info msg="StopPodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" returns successfully" Feb 12 22:15:40.437813 env[1161]: time="2024-02-12T22:15:40.437793132Z" level=info msg="RemovePodSandbox for \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\"" Feb 12 22:15:40.437958 env[1161]: time="2024-02-12T22:15:40.437833560Z" level=info msg="Forcibly stopping sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\"" Feb 12 22:15:40.442000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.452392 kernel: audit: type=1400 audit(1707776140.442:1337): avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.442000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f92540 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:40.442000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:40.442000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:15:40.442000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f92560 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:15:40.442000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.480 [WARNING][4539] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0", GenerateName:"calico-kube-controllers-6fb6955f4-", Namespace:"calico-system", SelfLink:"", UID:"89bf2018-6132-4f18-acae-ca2347433bab", ResourceVersion:"740", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6fb6955f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aef6421989c27d2ab7138790b33298e96c4c5601b5194c74a194e351e204b326", Pod:"calico-kube-controllers-6fb6955f4-hqlg9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali36a5a34e16b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.480 [INFO][4539] k8s.go 578: Cleaning up netns ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.480 [INFO][4539] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" iface="eth0" netns="" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.480 [INFO][4539] k8s.go 585: Releasing IP address(es) ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.480 [INFO][4539] utils.go 188: Calico CNI releasing IP address ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.491 [INFO][4545] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.491 [INFO][4545] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.491 [INFO][4545] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.497 [WARNING][4545] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.497 [INFO][4545] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" HandleID="k8s-pod-network.e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Workload="localhost-k8s-calico--kube--controllers--6fb6955f4--hqlg9-eth0" Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.498 [INFO][4545] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.500008 env[1161]: 2024-02-12 22:15:40.499 [INFO][4539] k8s.go 591: Teardown processing complete. ContainerID="e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52" Feb 12 22:15:40.500494 env[1161]: time="2024-02-12T22:15:40.500474374Z" level=info msg="TearDown network for sandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" successfully" Feb 12 22:15:40.501730 env[1161]: time="2024-02-12T22:15:40.501717421Z" level=info msg="RemovePodSandbox \"e1bf12075907e6dfc8e6a1418eea8d6fb99efaba59973fa3f13af417e1728f52\" returns successfully" Feb 12 22:15:40.502061 env[1161]: time="2024-02-12T22:15:40.502050011Z" level=info msg="StopPodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\"" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.522 [WARNING][4563] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hsbwn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1d4a8b2-7626-4b49-927f-6d4573ba6436", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e", Pod:"csi-node-driver-hsbwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali142780f0aa6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.522 [INFO][4563] k8s.go 578: Cleaning up netns ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.522 [INFO][4563] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" iface="eth0" netns="" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.522 [INFO][4563] k8s.go 585: Releasing IP address(es) ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.522 [INFO][4563] utils.go 188: Calico CNI releasing IP address ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.533 [INFO][4570] ipam_plugin.go 415: Releasing address using handleID ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.533 [INFO][4570] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.533 [INFO][4570] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.536 [WARNING][4570] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.537 [INFO][4570] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.537 [INFO][4570] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.539468 env[1161]: 2024-02-12 22:15:40.538 [INFO][4563] k8s.go 591: Teardown processing complete. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.540067 env[1161]: time="2024-02-12T22:15:40.539482211Z" level=info msg="TearDown network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" successfully" Feb 12 22:15:40.540067 env[1161]: time="2024-02-12T22:15:40.539507829Z" level=info msg="StopPodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" returns successfully" Feb 12 22:15:40.540164 env[1161]: time="2024-02-12T22:15:40.540152861Z" level=info msg="RemovePodSandbox for \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\"" Feb 12 22:15:40.540253 env[1161]: time="2024-02-12T22:15:40.540228189Z" level=info msg="Forcibly stopping sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\"" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.558 [WARNING][4589] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hsbwn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1d4a8b2-7626-4b49-927f-6d4573ba6436", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"27d9f2162d4dcf5a30a3f7ad844c7ce3a4e57a5a4d90216ce07f948956c7bd0e", Pod:"csi-node-driver-hsbwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali142780f0aa6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.559 [INFO][4589] k8s.go 578: Cleaning up netns ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.559 [INFO][4589] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" iface="eth0" netns="" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.559 [INFO][4589] k8s.go 585: Releasing IP address(es) ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.559 [INFO][4589] utils.go 188: Calico CNI releasing IP address ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.573 [INFO][4595] ipam_plugin.go 415: Releasing address using handleID ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.573 [INFO][4595] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.573 [INFO][4595] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.577 [WARNING][4595] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.577 [INFO][4595] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" HandleID="k8s-pod-network.2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Workload="localhost-k8s-csi--node--driver--hsbwn-eth0" Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.577 [INFO][4595] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.579397 env[1161]: 2024-02-12 22:15:40.578 [INFO][4589] k8s.go 591: Teardown processing complete. ContainerID="2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988" Feb 12 22:15:40.580002 env[1161]: time="2024-02-12T22:15:40.579418986Z" level=info msg="TearDown network for sandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" successfully" Feb 12 22:15:40.580759 env[1161]: time="2024-02-12T22:15:40.580742970Z" level=info msg="RemovePodSandbox \"2de0f329d5b224cefac75058edafd7ddd694be3fa6fff9d7b33621832f4bb988\" returns successfully" Feb 12 22:15:40.581032 env[1161]: time="2024-02-12T22:15:40.581019263Z" level=info msg="StopPodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\"" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.600 [WARNING][4613] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--x922s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ba9e8d56-d1ac-43ad-a596-f39c3905f185", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0", Pod:"coredns-787d4945fb-x922s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia62b538b3ba", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.600 [INFO][4613] k8s.go 578: Cleaning up netns ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.600 [INFO][4613] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" iface="eth0" netns="" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.600 [INFO][4613] k8s.go 585: Releasing IP address(es) ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.600 [INFO][4613] utils.go 188: Calico CNI releasing IP address ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.611 [INFO][4620] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.612 [INFO][4620] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.612 [INFO][4620] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.615 [WARNING][4620] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.615 [INFO][4620] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.616 [INFO][4620] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.618091 env[1161]: 2024-02-12 22:15:40.617 [INFO][4613] k8s.go 591: Teardown processing complete. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.618455 env[1161]: time="2024-02-12T22:15:40.618435083Z" level=info msg="TearDown network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" successfully" Feb 12 22:15:40.618504 env[1161]: time="2024-02-12T22:15:40.618493601Z" level=info msg="StopPodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" returns successfully" Feb 12 22:15:40.619415 env[1161]: time="2024-02-12T22:15:40.619402967Z" level=info msg="RemovePodSandbox for \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\"" Feb 12 22:15:40.619489 env[1161]: time="2024-02-12T22:15:40.619465075Z" level=info msg="Forcibly stopping sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\"" Feb 12 22:15:40.630910 sshd[4446]: Failed password for root from 187.190.112.180 port 12944 ssh2 Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.640 [WARNING][4639] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--x922s-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"ba9e8d56-d1ac-43ad-a596-f39c3905f185", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9fa4cbb1fc277274412f9c967c5f72ee9f515acc704aef384d49b180f790c0d0", Pod:"coredns-787d4945fb-x922s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia62b538b3ba", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.640 [INFO][4639] k8s.go 578: Cleaning up netns ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.640 [INFO][4639] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" iface="eth0" netns="" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.640 [INFO][4639] k8s.go 585: Releasing IP address(es) ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.640 [INFO][4639] utils.go 188: Calico CNI releasing IP address ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.653 [INFO][4645] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.653 [INFO][4645] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.653 [INFO][4645] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.657 [WARNING][4645] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.657 [INFO][4645] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" HandleID="k8s-pod-network.8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Workload="localhost-k8s-coredns--787d4945fb--x922s-eth0" Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.658 [INFO][4645] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:40.660112 env[1161]: 2024-02-12 22:15:40.659 [INFO][4639] k8s.go 591: Teardown processing complete. ContainerID="8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb" Feb 12 22:15:40.660498 env[1161]: time="2024-02-12T22:15:40.660479573Z" level=info msg="TearDown network for sandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" successfully" Feb 12 22:15:40.661692 env[1161]: time="2024-02-12T22:15:40.661679350Z" level=info msg="RemovePodSandbox \"8a14cd172ac2963e509a45f164fe2fdc5cdc395f129ca639a9e86a39d3e1ddfb\" returns successfully" Feb 12 22:15:40.779209 sshd[4446]: Received disconnect from 187.190.112.180 port 12944:11: Bye Bye [preauth] Feb 12 22:15:40.779721 sshd[4446]: Disconnected from authenticating user root 187.190.112.180 port 12944 [preauth] Feb 12 22:15:40.780703 systemd[1]: sshd@29-139.178.70.100:22-187.190.112.180:12944.service: Deactivated successfully. Feb 12 22:15:40.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.100:22-187.190.112.180:12944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:43.291163 systemd[1]: run-containerd-runc-k8s.io-99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e-runc.5hFh2y.mount: Deactivated successfully. Feb 12 22:15:45.115200 systemd[1]: Started sshd@30-139.178.70.100:22-101.42.7.118:52382.service. Feb 12 22:15:45.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.100:22-101.42.7.118:52382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:45.116476 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 22:15:45.116515 kernel: audit: type=1130 audit(1707776145.113:1340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.100:22-101.42.7.118:52382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:46.091957 sshd[4674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:15:46.090000 audit[4674]: USER_AUTH pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:15:46.095845 kernel: audit: type=1100 audit(1707776146.090:1341): pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:15:46.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.100:22-188.166.160.119:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:46.655525 systemd[1]: Started sshd@31-139.178.70.100:22-188.166.160.119:50692.service. Feb 12 22:15:46.659848 kernel: audit: type=1130 audit(1707776146.653:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.100:22-188.166.160.119:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:47.562447 sshd[4677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.160.119 user=root Feb 12 22:15:47.560000 audit[4677]: USER_AUTH pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=188.166.160.119 addr=188.166.160.119 terminal=ssh res=failed' Feb 12 22:15:47.566843 kernel: audit: type=1100 audit(1707776147.560:1343): pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=188.166.160.119 addr=188.166.160.119 terminal=ssh res=failed' Feb 12 22:15:48.163148 sshd[4674]: Failed password for root from 101.42.7.118 port 52382 ssh2 Feb 12 22:15:49.687666 sshd[4674]: Received disconnect from 101.42.7.118 port 52382:11: Bye Bye [preauth] Feb 12 22:15:49.687666 sshd[4674]: Disconnected from authenticating user root 101.42.7.118 port 52382 [preauth] Feb 12 22:15:49.688630 systemd[1]: sshd@30-139.178.70.100:22-101.42.7.118:52382.service: Deactivated successfully. Feb 12 22:15:49.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.100:22-101.42.7.118:52382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:49.693843 kernel: audit: type=1131 audit(1707776149.686:1344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.100:22-101.42.7.118:52382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:49.768067 sshd[4677]: Failed password for root from 188.166.160.119 port 50692 ssh2 Feb 12 22:15:51.151657 sshd[4677]: Received disconnect from 188.166.160.119 port 50692:11: Bye Bye [preauth] Feb 12 22:15:51.151657 sshd[4677]: Disconnected from authenticating user root 188.166.160.119 port 50692 [preauth] Feb 12 22:15:51.152637 systemd[1]: sshd@31-139.178.70.100:22-188.166.160.119:50692.service: Deactivated successfully. Feb 12 22:15:51.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.100:22-188.166.160.119:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:51.157842 kernel: audit: type=1131 audit(1707776151.150:1345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.100:22-188.166.160.119:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:51.407231 systemd[1]: Started sshd@32-139.178.70.100:22-51.77.245.237:57846.service. Feb 12 22:15:51.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.100:22-51.77.245.237:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:51.412839 kernel: audit: type=1130 audit(1707776151.406:1346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.100:22-51.77.245.237:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:52.276565 sshd[4691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.237 user=root Feb 12 22:15:52.274000 audit[4691]: USER_AUTH pid=4691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=51.77.245.237 addr=51.77.245.237 terminal=ssh res=failed' Feb 12 22:15:52.280922 kernel: audit: type=1100 audit(1707776152.274:1347): pid=4691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=51.77.245.237 addr=51.77.245.237 terminal=ssh res=failed' Feb 12 22:15:53.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.100:22-124.220.29.33:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:53.095008 systemd[1]: Started sshd@33-139.178.70.100:22-124.220.29.33:38316.service. Feb 12 22:15:53.098853 kernel: audit: type=1130 audit(1707776153.093:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.100:22-124.220.29.33:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:54.170892 sshd[4691]: Failed password for root from 51.77.245.237 port 57846 ssh2 Feb 12 22:15:54.692778 systemd[1]: Started sshd@34-139.178.70.100:22-152.32.209.108:30684.service. Feb 12 22:15:54.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.100:22-152.32.209.108:30684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:54.698847 kernel: audit: type=1130 audit(1707776154.692:1349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.100:22-152.32.209.108:30684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:55.028520 systemd[1]: run-containerd-runc-k8s.io-e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54-runc.ujmM87.mount: Deactivated successfully. Feb 12 22:15:55.189373 systemd[1]: Started sshd@35-139.178.70.100:22-130.61.232.86:43838.service. Feb 12 22:15:55.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.100:22-130.61.232.86:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:55.194849 kernel: audit: type=1130 audit(1707776155.188:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.100:22-130.61.232.86:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:55.577043 sshd[4698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.209.108 user=root Feb 12 22:15:55.576000 audit[4698]: USER_AUTH pid=4698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=152.32.209.108 addr=152.32.209.108 terminal=ssh res=failed' Feb 12 22:15:55.580848 kernel: audit: type=1100 audit(1707776155.576:1351): pid=4698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=152.32.209.108 addr=152.32.209.108 terminal=ssh res=failed' Feb 12 22:15:55.856326 sshd[4691]: Received disconnect from 51.77.245.237 port 57846:11: Bye Bye [preauth] Feb 12 22:15:55.856326 sshd[4691]: Disconnected from authenticating user root 51.77.245.237 port 57846 [preauth] Feb 12 22:15:55.857489 systemd[1]: sshd@32-139.178.70.100:22-51.77.245.237:57846.service: Deactivated successfully. Feb 12 22:15:55.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.100:22-51.77.245.237:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:55.861846 kernel: audit: type=1131 audit(1707776155.856:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.100:22-51.77.245.237:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:56.050054 sshd[4723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 user=root Feb 12 22:15:56.049000 audit[4723]: USER_AUTH pid=4723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.61.232.86 addr=130.61.232.86 terminal=ssh res=failed' Feb 12 22:15:56.053839 kernel: audit: type=1100 audit(1707776156.049:1353): pid=4723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.61.232.86 addr=130.61.232.86 terminal=ssh res=failed' Feb 12 22:15:56.640227 systemd[1]: Started sshd@36-139.178.70.100:22-213.74.115.162:57874.service. Feb 12 22:15:56.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.100:22-213.74.115.162:57874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:56.644847 kernel: audit: type=1130 audit(1707776156.639:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.100:22-213.74.115.162:57874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:57.696684 sshd[4727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.115.162 user=root Feb 12 22:15:57.696000 audit[4727]: USER_AUTH pid=4727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=213.74.115.162 addr=213.74.115.162 terminal=ssh res=failed' Feb 12 22:15:57.700839 kernel: audit: type=1100 audit(1707776157.696:1355): pid=4727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=213.74.115.162 addr=213.74.115.162 terminal=ssh res=failed' Feb 12 22:15:57.884937 sshd[4698]: Failed password for root from 152.32.209.108 port 30684 ssh2 Feb 12 22:15:58.106000 audit[4755]: NETFILTER_CFG table=filter:122 family=2 entries=7 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.106000 audit[4755]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff28576f60 a2=0 a3=7fff28576f4c items=0 ppid=2389 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.112926 kernel: audit: type=1325 audit(1707776158.106:1356): table=filter:122 family=2 entries=7 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.112969 kernel: audit: type=1300 audit(1707776158.106:1356): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff28576f60 a2=0 a3=7fff28576f4c items=0 ppid=2389 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.106000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:58.114761 kernel: audit: type=1327 audit(1707776158.106:1356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:58.114000 audit[4755]: NETFILTER_CFG table=nat:123 family=2 entries=78 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.114000 audit[4755]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff28576f60 a2=0 a3=7fff28576f4c items=0 ppid=2389 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.121653 kernel: audit: type=1325 audit(1707776158.114:1357): table=nat:123 family=2 entries=78 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.121682 kernel: audit: type=1300 audit(1707776158.114:1357): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff28576f60 a2=0 a3=7fff28576f4c items=0 ppid=2389 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:58.123486 kernel: audit: type=1327 audit(1707776158.114:1357): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:58.126184 kubelet[2213]: I0212 22:15:58.126168 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:15:58.129120 kubelet[2213]: I0212 22:15:58.129107 2213 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:15:58.133499 systemd[1]: Created slice kubepods-besteffort-pod04e3eb3c_a21c_42de_a294_18557c141af1.slice. Feb 12 22:15:58.137091 systemd[1]: Created slice kubepods-besteffort-podc4a6b4ff_40b5_4efb_b065_569b6789c7fe.slice. Feb 12 22:15:58.152490 kernel: audit: type=1325 audit(1707776158.148:1358): table=filter:124 family=2 entries=8 op=nft_register_rule pid=4781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.148000 audit[4781]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.148000 audit[4781]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc93dd3100 a2=0 a3=7ffc93dd30ec items=0 ppid=2389 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.156842 kernel: audit: type=1300 audit(1707776158.148:1358): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc93dd3100 a2=0 a3=7ffc93dd30ec items=0 ppid=2389 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:58.158000 audit[4781]: NETFILTER_CFG table=nat:125 family=2 entries=78 op=nft_register_rule pid=4781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:15:58.158000 audit[4781]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc93dd3100 a2=0 a3=7ffc93dd30ec items=0 ppid=2389 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:58.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:15:58.159983 sshd[4723]: Failed password for root from 130.61.232.86 port 43838 ssh2 Feb 12 22:15:58.238675 kubelet[2213]: I0212 22:15:58.238656 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/04e3eb3c-a21c-42de-a294-18557c141af1-calico-apiserver-certs\") pod \"calico-apiserver-6878bbb66c-2wsvc\" (UID: \"04e3eb3c-a21c-42de-a294-18557c141af1\") " pod="calico-apiserver/calico-apiserver-6878bbb66c-2wsvc" Feb 12 22:15:58.240440 kubelet[2213]: I0212 22:15:58.240429 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c4a6b4ff-40b5-4efb-b065-569b6789c7fe-calico-apiserver-certs\") pod \"calico-apiserver-6878bbb66c-pgtbh\" (UID: \"c4a6b4ff-40b5-4efb-b065-569b6789c7fe\") " pod="calico-apiserver/calico-apiserver-6878bbb66c-pgtbh" Feb 12 22:15:58.240531 kubelet[2213]: I0212 22:15:58.240521 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kqjn7\" (UniqueName: \"kubernetes.io/projected/c4a6b4ff-40b5-4efb-b065-569b6789c7fe-kube-api-access-kqjn7\") pod \"calico-apiserver-6878bbb66c-pgtbh\" (UID: \"c4a6b4ff-40b5-4efb-b065-569b6789c7fe\") " pod="calico-apiserver/calico-apiserver-6878bbb66c-pgtbh" Feb 12 22:15:58.240615 kubelet[2213]: I0212 22:15:58.240605 2213 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qbllh\" (UniqueName: \"kubernetes.io/projected/04e3eb3c-a21c-42de-a294-18557c141af1-kube-api-access-qbllh\") pod \"calico-apiserver-6878bbb66c-2wsvc\" (UID: \"04e3eb3c-a21c-42de-a294-18557c141af1\") " pod="calico-apiserver/calico-apiserver-6878bbb66c-2wsvc" Feb 12 22:15:58.343331 kubelet[2213]: E0212 22:15:58.343309 2213 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 22:15:58.343555 kubelet[2213]: E0212 22:15:58.343369 2213 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 22:15:58.345288 kubelet[2213]: E0212 22:15:58.345265 2213 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/04e3eb3c-a21c-42de-a294-18557c141af1-calico-apiserver-certs podName:04e3eb3c-a21c-42de-a294-18557c141af1 nodeName:}" failed. No retries permitted until 2024-02-12 22:15:58.843748967 +0000 UTC m=+78.765440501 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/04e3eb3c-a21c-42de-a294-18557c141af1-calico-apiserver-certs") pod "calico-apiserver-6878bbb66c-2wsvc" (UID: "04e3eb3c-a21c-42de-a294-18557c141af1") : secret "calico-apiserver-certs" not found Feb 12 22:15:58.345385 kubelet[2213]: E0212 22:15:58.345305 2213 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c4a6b4ff-40b5-4efb-b065-569b6789c7fe-calico-apiserver-certs podName:c4a6b4ff-40b5-4efb-b065-569b6789c7fe nodeName:}" failed. No retries permitted until 2024-02-12 22:15:58.845282879 +0000 UTC m=+78.766974407 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c4a6b4ff-40b5-4efb-b065-569b6789c7fe-calico-apiserver-certs") pod "calico-apiserver-6878bbb66c-pgtbh" (UID: "c4a6b4ff-40b5-4efb-b065-569b6789c7fe") : secret "calico-apiserver-certs" not found Feb 12 22:15:59.037655 env[1161]: time="2024-02-12T22:15:59.037608293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6878bbb66c-2wsvc,Uid:04e3eb3c-a21c-42de-a294-18557c141af1,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:15:59.039598 env[1161]: time="2024-02-12T22:15:59.039571375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6878bbb66c-pgtbh,Uid:c4a6b4ff-40b5-4efb-b065-569b6789c7fe,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:15:59.157065 systemd-networkd[1062]: calieefab731b16: Link UP Feb 12 22:15:59.164000 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:15:59.164041 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieefab731b16: link becomes ready Feb 12 22:15:59.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.100:22-152.32.209.108:30684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:59.161190 systemd[1]: sshd@34-139.178.70.100:22-152.32.209.108:30684.service: Deactivated successfully. Feb 12 22:15:59.165672 sshd[4698]: Received disconnect from 152.32.209.108 port 30684:11: Bye Bye [preauth] Feb 12 22:15:59.165672 sshd[4698]: Disconnected from authenticating user root 152.32.209.108 port 30684 [preauth] Feb 12 22:15:59.162495 systemd-networkd[1062]: calieefab731b16: Gained carrier Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.091 [INFO][4788] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0 calico-apiserver-6878bbb66c- calico-apiserver 04e3eb3c-a21c-42de-a294-18557c141af1 856 0 2024-02-12 22:15:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6878bbb66c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6878bbb66c-2wsvc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calieefab731b16 [] []}} ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.091 [INFO][4788] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.120 [INFO][4813] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" HandleID="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Workload="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.126 [INFO][4813] ipam_plugin.go 268: Auto assigning IP ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" HandleID="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Workload="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ca90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6878bbb66c-2wsvc", "timestamp":"2024-02-12 22:15:59.120874552 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.126 [INFO][4813] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.126 [INFO][4813] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.126 [INFO][4813] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.127 [INFO][4813] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.129 [INFO][4813] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.133 [INFO][4813] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.135 [INFO][4813] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.138 [INFO][4813] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.138 [INFO][4813] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.138 [INFO][4813] ipam.go 1682: Creating new handle: k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440 Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.141 [INFO][4813] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.143 [INFO][4813] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.143 [INFO][4813] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" host="localhost" Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.143 [INFO][4813] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:59.176144 env[1161]: 2024-02-12 22:15:59.143 [INFO][4813] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" HandleID="k8s-pod-network.fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Workload="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.176921 env[1161]: 2024-02-12 22:15:59.149 [INFO][4788] k8s.go 385: Populated endpoint ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0", GenerateName:"calico-apiserver-6878bbb66c-", Namespace:"calico-apiserver", SelfLink:"", UID:"04e3eb3c-a21c-42de-a294-18557c141af1", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 15, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6878bbb66c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6878bbb66c-2wsvc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieefab731b16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:59.176921 env[1161]: 2024-02-12 22:15:59.149 [INFO][4788] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.176921 env[1161]: 2024-02-12 22:15:59.149 [INFO][4788] dataplane_linux.go 68: Setting the host side veth name to calieefab731b16 ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.176921 env[1161]: 2024-02-12 22:15:59.164 [INFO][4788] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.176921 env[1161]: 2024-02-12 22:15:59.165 [INFO][4788] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0", GenerateName:"calico-apiserver-6878bbb66c-", Namespace:"calico-apiserver", SelfLink:"", UID:"04e3eb3c-a21c-42de-a294-18557c141af1", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 15, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6878bbb66c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440", Pod:"calico-apiserver-6878bbb66c-2wsvc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieefab731b16", MAC:"da:5a:70:c7:58:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:59.176921 env[1161]: 2024-02-12 22:15:59.174 [INFO][4788] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-2wsvc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--2wsvc-eth0" Feb 12 22:15:59.186863 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali640b7b5e3a7: link becomes ready Feb 12 22:15:59.186974 systemd-networkd[1062]: cali640b7b5e3a7: Link UP Feb 12 22:15:59.187085 systemd-networkd[1062]: cali640b7b5e3a7: Gained carrier Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.091 [INFO][4792] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0 calico-apiserver-6878bbb66c- calico-apiserver c4a6b4ff-40b5-4efb-b065-569b6789c7fe 854 0 2024-02-12 22:15:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6878bbb66c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6878bbb66c-pgtbh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali640b7b5e3a7 [] []}} ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.091 [INFO][4792] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.132 [INFO][4817] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" HandleID="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Workload="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.138 [INFO][4817] ipam_plugin.go 268: Auto assigning IP ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" HandleID="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Workload="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325040), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6878bbb66c-pgtbh", "timestamp":"2024-02-12 22:15:59.132685639 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.138 [INFO][4817] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.144 [INFO][4817] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.144 [INFO][4817] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.145 [INFO][4817] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.147 [INFO][4817] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.150 [INFO][4817] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.158 [INFO][4817] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.166 [INFO][4817] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.166 [INFO][4817] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.171 [INFO][4817] ipam.go 1682: Creating new handle: k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147 Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.177 [INFO][4817] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.183 [INFO][4817] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.183 [INFO][4817] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" host="localhost" Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.183 [INFO][4817] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:15:59.195654 env[1161]: 2024-02-12 22:15:59.183 [INFO][4817] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" HandleID="k8s-pod-network.4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Workload="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.197060 env[1161]: 2024-02-12 22:15:59.184 [INFO][4792] k8s.go 385: Populated endpoint ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0", GenerateName:"calico-apiserver-6878bbb66c-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4a6b4ff-40b5-4efb-b065-569b6789c7fe", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 15, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6878bbb66c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6878bbb66c-pgtbh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali640b7b5e3a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:59.197060 env[1161]: 2024-02-12 22:15:59.184 [INFO][4792] k8s.go 386: Calico CNI using IPs: [192.168.88.134/32] ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.197060 env[1161]: 2024-02-12 22:15:59.184 [INFO][4792] dataplane_linux.go 68: Setting the host side veth name to cali640b7b5e3a7 ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.197060 env[1161]: 2024-02-12 22:15:59.186 [INFO][4792] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.197060 env[1161]: 2024-02-12 22:15:59.187 [INFO][4792] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0", GenerateName:"calico-apiserver-6878bbb66c-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4a6b4ff-40b5-4efb-b065-569b6789c7fe", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 15, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6878bbb66c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147", Pod:"calico-apiserver-6878bbb66c-pgtbh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali640b7b5e3a7", MAC:"66:88:3d:bb:63:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:15:59.197060 env[1161]: 2024-02-12 22:15:59.193 [INFO][4792] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147" Namespace="calico-apiserver" Pod="calico-apiserver-6878bbb66c-pgtbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--6878bbb66c--pgtbh-eth0" Feb 12 22:15:59.210776 env[1161]: time="2024-02-12T22:15:59.209548959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:15:59.210776 env[1161]: time="2024-02-12T22:15:59.209578379Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:15:59.210776 env[1161]: time="2024-02-12T22:15:59.209586304Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:15:59.210776 env[1161]: time="2024-02-12T22:15:59.209644672Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440 pid=4859 runtime=io.containerd.runc.v2 Feb 12 22:15:59.218026 env[1161]: time="2024-02-12T22:15:59.217994325Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:15:59.218132 env[1161]: time="2024-02-12T22:15:59.218118828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:15:59.218246 env[1161]: time="2024-02-12T22:15:59.218217633Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:15:59.218710 env[1161]: time="2024-02-12T22:15:59.218686413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147 pid=4876 runtime=io.containerd.runc.v2 Feb 12 22:15:59.229545 systemd[1]: Started cri-containerd-fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440.scope. Feb 12 22:15:59.248262 systemd[1]: Started cri-containerd-4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147.scope. Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.260000 audit: BPF prog-id=186 op=LOAD Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4876 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666462306132636538343731306530623635623861663366613861 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4876 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666462306132636538343731306530623635623861663366613861 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit: BPF prog-id=187 op=LOAD Feb 12 22:15:59.261000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00037a1b0 items=0 ppid=4876 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666462306132636538343731306530623635623861663366613861 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit: BPF prog-id=188 op=LOAD Feb 12 22:15:59.261000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00037a1f8 items=0 ppid=4876 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666462306132636538343731306530623635623861663366613861 Feb 12 22:15:59.261000 audit: BPF prog-id=188 op=UNLOAD Feb 12 22:15:59.261000 audit: BPF prog-id=187 op=UNLOAD Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit: BPF prog-id=189 op=LOAD Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4859 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661623732353537313964366665393562366465303130366162613764 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4859 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661623732353537313964366665393562366465303130366162613764 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.262000 audit: BPF prog-id=190 op=LOAD Feb 12 22:15:59.262000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029fb10 items=0 ppid=4859 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661623732353537313964366665393562366465303130366162613764 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit: BPF prog-id=191 op=LOAD Feb 12 22:15:59.263000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029fb58 items=0 ppid=4859 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661623732353537313964366665393562366465303130366162613764 Feb 12 22:15:59.263000 audit: BPF prog-id=191 op=UNLOAD Feb 12 22:15:59.263000 audit: BPF prog-id=190 op=UNLOAD Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.263000 audit: BPF prog-id=192 op=LOAD Feb 12 22:15:59.261000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:15:59.261000 audit: BPF prog-id=193 op=LOAD Feb 12 22:15:59.261000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037a608 items=0 ppid=4876 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666462306132636538343731306530623635623861663366613861 Feb 12 22:15:59.263000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029ff68 items=0 ppid=4859 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.265649 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:15:59.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661623732353537313964366665393562366465303130366162613764 Feb 12 22:15:59.268762 systemd-resolved[1105]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 22:15:59.275910 sshd[4727]: Failed password for root from 213.74.115.162 port 57874 ssh2 Feb 12 22:15:59.277000 audit[4923]: NETFILTER_CFG table=filter:126 family=2 entries=85 op=nft_register_chain pid=4923 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:15:59.277000 audit[4923]: SYSCALL arch=c000003e syscall=46 success=yes exit=46104 a0=3 a1=7ffc27196f90 a2=0 a3=7ffc27196f7c items=0 ppid=3972 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:15:59.277000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:15:59.293077 env[1161]: time="2024-02-12T22:15:59.291262860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6878bbb66c-pgtbh,Uid:c4a6b4ff-40b5-4efb-b065-569b6789c7fe,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147\"" Feb 12 22:15:59.294101 env[1161]: time="2024-02-12T22:15:59.294088980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:15:59.297897 env[1161]: time="2024-02-12T22:15:59.297877329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6878bbb66c-2wsvc,Uid:04e3eb3c-a21c-42de-a294-18557c141af1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440\"" Feb 12 22:15:59.601603 sshd[4727]: Received disconnect from 213.74.115.162 port 57874:11: Bye Bye [preauth] Feb 12 22:15:59.601603 sshd[4727]: Disconnected from authenticating user root 213.74.115.162 port 57874 [preauth] Feb 12 22:15:59.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.100:22-213.74.115.162:57874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:15:59.603051 systemd[1]: sshd@36-139.178.70.100:22-213.74.115.162:57874.service: Deactivated successfully. Feb 12 22:15:59.627163 sshd[4723]: Received disconnect from 130.61.232.86 port 43838:11: Bye Bye [preauth] Feb 12 22:15:59.627163 sshd[4723]: Disconnected from authenticating user root 130.61.232.86 port 43838 [preauth] Feb 12 22:15:59.627884 systemd[1]: sshd@35-139.178.70.100:22-130.61.232.86:43838.service: Deactivated successfully. Feb 12 22:15:59.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.100:22-130.61.232.86:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:00.428982 systemd-networkd[1062]: calieefab731b16: Gained IPv6LL Feb 12 22:16:00.768280 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1215362695.mount: Deactivated successfully. Feb 12 22:16:01.196950 systemd-networkd[1062]: cali640b7b5e3a7: Gained IPv6LL Feb 12 22:16:03.080120 env[1161]: time="2024-02-12T22:16:03.080092374Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.080970 env[1161]: time="2024-02-12T22:16:03.080951187Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.082030 env[1161]: time="2024-02-12T22:16:03.082014983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.083027 env[1161]: time="2024-02-12T22:16:03.083014875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.083474 env[1161]: time="2024-02-12T22:16:03.083459642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:16:03.083997 env[1161]: time="2024-02-12T22:16:03.083921442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:16:03.085490 env[1161]: time="2024-02-12T22:16:03.085476228Z" level=info msg="CreateContainer within sandbox \"4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:16:03.091837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3098904716.mount: Deactivated successfully. Feb 12 22:16:03.093602 env[1161]: time="2024-02-12T22:16:03.093574490Z" level=info msg="CreateContainer within sandbox \"4efdb0a2ce84710e0b65b8af3fa8a54137aea37f1ed9502df267e950f580f147\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cffd4bd52c2276f90c6ddfd5cde2bd4487e6de64f929cf248f0eeda3c0214c3a\"" Feb 12 22:16:03.094001 env[1161]: time="2024-02-12T22:16:03.093988560Z" level=info msg="StartContainer for \"cffd4bd52c2276f90c6ddfd5cde2bd4487e6de64f929cf248f0eeda3c0214c3a\"" Feb 12 22:16:03.109866 systemd[1]: Started cri-containerd-cffd4bd52c2276f90c6ddfd5cde2bd4487e6de64f929cf248f0eeda3c0214c3a.scope. Feb 12 22:16:03.130320 kernel: kauditd_printk_skb: 124 callbacks suppressed Feb 12 22:16:03.130391 kernel: audit: type=1400 audit(1707776163.126:1400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.130413 kernel: audit: type=1400 audit(1707776163.126:1401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.135055 kernel: audit: type=1400 audit(1707776163.126:1402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.140730 kernel: audit: type=1400 audit(1707776163.126:1403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.140772 kernel: audit: type=1400 audit(1707776163.126:1404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.140803 kernel: audit: type=1400 audit(1707776163.126:1405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.143216 kernel: audit: type=1400 audit(1707776163.126:1406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.148051 kernel: audit: type=1400 audit(1707776163.126:1407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.150919 kernel: audit: type=1400 audit(1707776163.126:1408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.150958 kernel: audit: type=1400 audit(1707776163.131:1409): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.131000 audit: BPF prog-id=194 op=LOAD Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4876 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666434626435326332323736663930633664646664356364653262 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4876 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666434626435326332323736663930633664646664356364653262 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit: BPF prog-id=195 op=LOAD Feb 12 22:16:03.134000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00027bdc0 items=0 ppid=4876 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666434626435326332323736663930633664646664356364653262 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit: BPF prog-id=196 op=LOAD Feb 12 22:16:03.134000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00027be08 items=0 ppid=4876 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666434626435326332323736663930633664646664356364653262 Feb 12 22:16:03.134000 audit: BPF prog-id=196 op=UNLOAD Feb 12 22:16:03.134000 audit: BPF prog-id=195 op=UNLOAD Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.134000 audit: BPF prog-id=197 op=LOAD Feb 12 22:16:03.134000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e8218 items=0 ppid=4876 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666434626435326332323736663930633664646664356364653262 Feb 12 22:16:03.169984 env[1161]: time="2024-02-12T22:16:03.169954894Z" level=info msg="StartContainer for \"cffd4bd52c2276f90c6ddfd5cde2bd4487e6de64f929cf248f0eeda3c0214c3a\" returns successfully" Feb 12 22:16:03.415577 kubelet[2213]: I0212 22:16:03.415558 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6878bbb66c-pgtbh" podStartSLOduration=-9.223372031443424e+09 pod.CreationTimestamp="2024-02-12 22:15:58 +0000 UTC" firstStartedPulling="2024-02-12 22:15:59.293717243 +0000 UTC m=+79.215408769" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:16:03.410742475 +0000 UTC m=+83.332434010" watchObservedRunningTime="2024-02-12 22:16:03.411350783 +0000 UTC m=+83.333042313" Feb 12 22:16:03.450000 audit[5003]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=5003 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:03.450000 audit[5003]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc789b34c0 a2=0 a3=7ffc789b34ac items=0 ppid=2389 pid=5003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:03.452000 audit[5003]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5003 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:03.452000 audit[5003]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc789b34c0 a2=0 a3=7ffc789b34ac items=0 ppid=2389 pid=5003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:03.498439 env[1161]: time="2024-02-12T22:16:03.498411407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.499501 env[1161]: time="2024-02-12T22:16:03.499483523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.500472 env[1161]: time="2024-02-12T22:16:03.500456532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.501457 env[1161]: time="2024-02-12T22:16:03.501443008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:16:03.501925 env[1161]: time="2024-02-12T22:16:03.501910757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:16:03.503087 env[1161]: time="2024-02-12T22:16:03.503073810Z" level=info msg="CreateContainer within sandbox \"fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:16:03.507341 env[1161]: time="2024-02-12T22:16:03.507312376Z" level=info msg="CreateContainer within sandbox \"fab7255719d6fe95b6de0106aba7d33f2b8d9afd8a5373caa426555a13e25440\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"678d5228376245b712b30244f90fce80bb25ff11441a8dd9afe7b7d1adcf6340\"" Feb 12 22:16:03.507866 env[1161]: time="2024-02-12T22:16:03.507850518Z" level=info msg="StartContainer for \"678d5228376245b712b30244f90fce80bb25ff11441a8dd9afe7b7d1adcf6340\"" Feb 12 22:16:03.519031 systemd[1]: Started cri-containerd-678d5228376245b712b30244f90fce80bb25ff11441a8dd9afe7b7d1adcf6340.scope. Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit: BPF prog-id=198 op=LOAD Feb 12 22:16:03.535000 audit[4958]: AVC avc: denied { watch } for pid=4958 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_15_58.3456761415/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c870 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c71,c870 tclass=file permissive=0 Feb 12 22:16:03.535000 audit[4958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006e5ca0 a2=fc6 a3=0 items=0 ppid=4876 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c870 key=(null) Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4859 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386435323238333736323435623731326233303234346639306663 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=4859 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386435323238333736323435623731326233303234346639306663 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit: BPF prog-id=199 op=LOAD Feb 12 22:16:03.535000 audit[5011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000290950 items=0 ppid=4859 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386435323238333736323435623731326233303234346639306663 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit: BPF prog-id=200 op=LOAD Feb 12 22:16:03.535000 audit[5011]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000290998 items=0 ppid=4859 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386435323238333736323435623731326233303234346639306663 Feb 12 22:16:03.535000 audit: BPF prog-id=200 op=UNLOAD Feb 12 22:16:03.535000 audit: BPF prog-id=199 op=UNLOAD Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { perfmon } for pid=5011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit[5011]: AVC avc: denied { bpf } for pid=5011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:16:03.535000 audit: BPF prog-id=201 op=LOAD Feb 12 22:16:03.535000 audit[5011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000290da8 items=0 ppid=4859 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:03.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637386435323238333736323435623731326233303234346639306663 Feb 12 22:16:03.535000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:16:03.562811 env[1161]: time="2024-02-12T22:16:03.562778971Z" level=info msg="StartContainer for \"678d5228376245b712b30244f90fce80bb25ff11441a8dd9afe7b7d1adcf6340\" returns successfully" Feb 12 22:16:03.789000 audit[5022]: AVC avc: denied { watch } for pid=5022 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_15_58.1325303809/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c246 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c246 tclass=file permissive=0 Feb 12 22:16:03.789000 audit[5022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00060fb80 a2=fc6 a3=0 items=0 ppid=4859 pid=5022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c246 key=(null) Feb 12 22:16:03.789000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:16:04.090922 systemd[1]: run-containerd-runc-k8s.io-cffd4bd52c2276f90c6ddfd5cde2bd4487e6de64f929cf248f0eeda3c0214c3a-runc.B327AZ.mount: Deactivated successfully. Feb 12 22:16:04.415190 kubelet[2213]: I0212 22:16:04.415165 2213 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6878bbb66c-2wsvc" podStartSLOduration=-9.223372030439636e+09 pod.CreationTimestamp="2024-02-12 22:15:58 +0000 UTC" firstStartedPulling="2024-02-12 22:15:59.298823679 +0000 UTC m=+79.220515206" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:16:04.414088633 +0000 UTC m=+84.335780167" watchObservedRunningTime="2024-02-12 22:16:04.415140223 +0000 UTC m=+84.336831757" Feb 12 22:16:04.448000 audit[5069]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:04.448000 audit[5069]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe82d0afc0 a2=0 a3=7ffe82d0afac items=0 ppid=2389 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:04.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:04.449000 audit[5069]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:04.449000 audit[5069]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe82d0afc0 a2=0 a3=7ffe82d0afac items=0 ppid=2389 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:04.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:09.960990 systemd[1]: Started sshd@37-139.178.70.100:22-139.178.89.65:50752.service. Feb 12 22:16:09.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.100:22-139.178.89.65:50752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:09.962064 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 22:16:09.962105 kernel: audit: type=1130 audit(1707776169.960:1442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.100:22-139.178.89.65:50752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:10.040599 sshd[5088]: Accepted publickey for core from 139.178.89.65 port 50752 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:10.039000 audit[5088]: USER_ACCT pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.043000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.047903 kernel: audit: type=1101 audit(1707776170.039:1443): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.049966 kernel: audit: type=1103 audit(1707776170.043:1444): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.049988 kernel: audit: type=1006 audit(1707776170.043:1445): pid=5088 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 22:16:10.050439 sshd[5088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:10.043000 audit[5088]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff490db20 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:10.056347 kernel: audit: type=1300 audit(1707776170.043:1445): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff490db20 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:10.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:10.057859 kernel: audit: type=1327 audit(1707776170.043:1445): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:10.061623 systemd[1]: Started session-10.scope. Feb 12 22:16:10.061715 systemd-logind[1142]: New session 10 of user core. Feb 12 22:16:10.064000 audit[5088]: USER_START pid=5088 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.064000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.072151 kernel: audit: type=1105 audit(1707776170.064:1446): pid=5088 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.072186 kernel: audit: type=1103 audit(1707776170.064:1447): pid=5090 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.418259 sshd[5088]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:10.418000 audit[5088]: USER_END pid=5088 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.425564 kernel: audit: type=1106 audit(1707776170.418:1448): pid=5088 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.425592 kernel: audit: type=1104 audit(1707776170.418:1449): pid=5088 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.418000 audit[5088]: CRED_DISP pid=5088 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:10.425752 systemd[1]: sshd@37-139.178.70.100:22-139.178.89.65:50752.service: Deactivated successfully. Feb 12 22:16:10.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.100:22-139.178.89.65:50752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:10.426250 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 22:16:10.426969 systemd-logind[1142]: Session 10 logged out. Waiting for processes to exit. Feb 12 22:16:10.427470 systemd-logind[1142]: Removed session 10. Feb 12 22:16:12.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.100:22-101.42.7.118:59588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:12.399731 systemd[1]: Started sshd@38-139.178.70.100:22-101.42.7.118:59588.service. Feb 12 22:16:13.446219 sshd[5101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:16:13.445000 audit[5101]: USER_AUTH pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:16:13.792935 sshd[1322]: Timeout before authentication for 124.220.29.33 port 49064 Feb 12 22:16:13.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-124.220.29.33:49064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:13.793708 systemd[1]: sshd@8-139.178.70.100:22-124.220.29.33:49064.service: Deactivated successfully. Feb 12 22:16:15.422635 systemd[1]: Started sshd@39-139.178.70.100:22-139.178.89.65:50766.service. Feb 12 22:16:15.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.100:22-139.178.89.65:50766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:15.424542 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 22:16:15.424600 kernel: audit: type=1130 audit(1707776175.422:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.100:22-139.178.89.65:50766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:15.455000 audit[5124]: USER_ACCT pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.458872 sshd[5124]: Accepted publickey for core from 139.178.89.65 port 50766 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:15.459000 audit[5124]: CRED_ACQ pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.461058 sshd[5124]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:15.463839 kernel: audit: type=1101 audit(1707776175.455:1455): pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.464117 kernel: audit: type=1103 audit(1707776175.459:1456): pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.464152 kernel: audit: type=1006 audit(1707776175.459:1457): pid=5124 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 22:16:15.465848 kernel: audit: type=1300 audit(1707776175.459:1457): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc662acaa0 a2=3 a3=0 items=0 ppid=1 pid=5124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:15.459000 audit[5124]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc662acaa0 a2=3 a3=0 items=0 ppid=1 pid=5124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:15.468076 systemd[1]: Started session-11.scope. Feb 12 22:16:15.469476 kernel: audit: type=1327 audit(1707776175.459:1457): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:15.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:15.468877 systemd-logind[1142]: New session 11 of user core. Feb 12 22:16:15.471000 audit[5124]: USER_START pid=5124 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.472000 audit[5126]: CRED_ACQ pid=5126 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.478770 kernel: audit: type=1105 audit(1707776175.471:1458): pid=5124 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.479250 kernel: audit: type=1103 audit(1707776175.472:1459): pid=5126 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.598030 sshd[5124]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:15.597000 audit[5124]: USER_END pid=5124 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.600000 audit[5124]: CRED_DISP pid=5124 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.602662 systemd-logind[1142]: Session 11 logged out. Waiting for processes to exit. Feb 12 22:16:15.603463 systemd[1]: sshd@39-139.178.70.100:22-139.178.89.65:50766.service: Deactivated successfully. Feb 12 22:16:15.603902 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 22:16:15.604725 systemd-logind[1142]: Removed session 11. Feb 12 22:16:15.605857 kernel: audit: type=1106 audit(1707776175.597:1460): pid=5124 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.605889 kernel: audit: type=1104 audit(1707776175.600:1461): pid=5124 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:15.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.100:22-139.178.89.65:50766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:16.222934 sshd[5101]: Failed password for root from 101.42.7.118 port 59588 ssh2 Feb 12 22:16:17.057043 sshd[5101]: Received disconnect from 101.42.7.118 port 59588:11: Bye Bye [preauth] Feb 12 22:16:17.057182 sshd[5101]: Disconnected from authenticating user root 101.42.7.118 port 59588 [preauth] Feb 12 22:16:17.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.100:22-101.42.7.118:59588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:17.057915 systemd[1]: sshd@38-139.178.70.100:22-101.42.7.118:59588.service: Deactivated successfully. Feb 12 22:16:20.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.100:22-139.178.89.65:52206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:20.601640 systemd[1]: Started sshd@40-139.178.70.100:22-139.178.89.65:52206.service. Feb 12 22:16:20.602492 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 22:16:20.602512 kernel: audit: type=1130 audit(1707776180.600:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.100:22-139.178.89.65:52206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:20.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.100:22-178.128.219.157:36192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:20.862988 systemd[1]: Started sshd@41-139.178.70.100:22-178.128.219.157:36192.service. Feb 12 22:16:20.867990 kernel: audit: type=1130 audit(1707776180.862:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.100:22-178.128.219.157:36192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:20.892000 audit[5141]: USER_ACCT pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.897805 sshd[5141]: Accepted publickey for core from 139.178.89.65 port 52206 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:20.898039 kernel: audit: type=1101 audit(1707776180.892:1466): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.900000 audit[5141]: CRED_ACQ pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.905873 kernel: audit: type=1103 audit(1707776180.900:1467): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.900000 audit[5141]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec5a91f90 a2=3 a3=0 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:20.912086 kernel: audit: type=1006 audit(1707776180.900:1468): pid=5141 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 22:16:20.912151 kernel: audit: type=1300 audit(1707776180.900:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec5a91f90 a2=3 a3=0 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:20.900000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:20.913567 kernel: audit: type=1327 audit(1707776180.900:1468): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:20.919874 sshd[5141]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:20.949744 systemd[1]: Started session-12.scope. Feb 12 22:16:20.950751 systemd-logind[1142]: New session 12 of user core. Feb 12 22:16:20.953000 audit[5141]: USER_START pid=5141 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.960002 kernel: audit: type=1105 audit(1707776180.953:1469): pid=5141 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.958000 audit[5145]: CRED_ACQ pid=5145 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:20.964868 kernel: audit: type=1103 audit(1707776180.958:1470): pid=5145 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:21.171575 sshd[5141]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:21.171000 audit[5141]: USER_END pid=5141 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:21.175839 kernel: audit: type=1106 audit(1707776181.171:1471): pid=5141 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:21.175000 audit[5141]: CRED_DISP pid=5141 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:21.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.100:22-139.178.89.65:52206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:21.176777 systemd[1]: sshd@40-139.178.70.100:22-139.178.89.65:52206.service: Deactivated successfully. Feb 12 22:16:21.177266 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 22:16:21.177945 systemd-logind[1142]: Session 12 logged out. Waiting for processes to exit. Feb 12 22:16:21.178642 systemd-logind[1142]: Removed session 12. Feb 12 22:16:21.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.100:22-162.142.125.216:33892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:21.667690 systemd[1]: Started sshd@42-139.178.70.100:22-162.142.125.216:33892.service. Feb 12 22:16:22.281232 sshd[5144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.219.157 user=root Feb 12 22:16:22.280000 audit[5144]: USER_AUTH pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=178.128.219.157 addr=178.128.219.157 terminal=ssh res=failed' Feb 12 22:16:23.960074 sshd[5144]: Failed password for root from 178.128.219.157 port 36192 ssh2 Feb 12 22:16:24.243986 sshd[5144]: Received disconnect from 178.128.219.157 port 36192:11: Bye Bye [preauth] Feb 12 22:16:24.243986 sshd[5144]: Disconnected from authenticating user root 178.128.219.157 port 36192 [preauth] Feb 12 22:16:24.244783 systemd[1]: sshd@41-139.178.70.100:22-178.128.219.157:36192.service: Deactivated successfully. Feb 12 22:16:24.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.100:22-178.128.219.157:36192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:25.029295 systemd[1]: run-containerd-runc-k8s.io-e6064532a29cddc0b1390bc3e07c795e21e4e3780b28ebfc73616b3271a02d54-runc.AGkVDu.mount: Deactivated successfully. Feb 12 22:16:26.025599 systemd[1]: run-containerd-runc-k8s.io-99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e-runc.zVqD5U.mount: Deactivated successfully. Feb 12 22:16:26.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.100:22-139.178.89.65:52212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:26.175292 systemd[1]: Started sshd@43-139.178.70.100:22-139.178.89.65:52212.service. Feb 12 22:16:26.176539 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 12 22:16:26.176590 kernel: audit: type=1130 audit(1707776186.174:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.100:22-139.178.89.65:52212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:26.242000 audit[5206]: USER_ACCT pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.248647 sshd[5206]: Accepted publickey for core from 139.178.89.65 port 52212 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:26.248912 kernel: audit: type=1101 audit(1707776186.242:1478): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.249000 audit[5206]: CRED_ACQ pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.256633 kernel: audit: type=1103 audit(1707776186.249:1479): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.256752 kernel: audit: type=1006 audit(1707776186.249:1480): pid=5206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 22:16:26.256776 kernel: audit: type=1300 audit(1707776186.249:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebefa3790 a2=3 a3=0 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:26.249000 audit[5206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebefa3790 a2=3 a3=0 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:26.249000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:26.260787 sshd[5206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:26.262052 kernel: audit: type=1327 audit(1707776186.249:1480): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:26.266163 systemd-logind[1142]: New session 13 of user core. Feb 12 22:16:26.266666 systemd[1]: Started session-13.scope. Feb 12 22:16:26.268000 audit[5206]: USER_START pid=5206 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.274096 kernel: audit: type=1105 audit(1707776186.268:1481): pid=5206 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.274139 kernel: audit: type=1103 audit(1707776186.273:1482): pid=5208 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.273000 audit[5208]: CRED_ACQ pid=5208 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.403662 sshd[5206]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:26.403000 audit[5206]: USER_END pid=5206 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.404000 audit[5206]: CRED_DISP pid=5206 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.409243 systemd[1]: Started sshd@44-139.178.70.100:22-139.178.89.65:52216.service. Feb 12 22:16:26.412614 kernel: audit: type=1106 audit(1707776186.403:1483): pid=5206 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.412649 kernel: audit: type=1104 audit(1707776186.404:1484): pid=5206 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.100:22-139.178.89.65:52216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:26.418770 systemd[1]: sshd@43-139.178.70.100:22-139.178.89.65:52212.service: Deactivated successfully. Feb 12 22:16:26.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.100:22-139.178.89.65:52212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:26.419348 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 22:16:26.419789 systemd-logind[1142]: Session 13 logged out. Waiting for processes to exit. Feb 12 22:16:26.420280 systemd-logind[1142]: Removed session 13. Feb 12 22:16:26.447000 audit[5217]: USER_ACCT pid=5217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.448238 sshd[5217]: Accepted publickey for core from 139.178.89.65 port 52216 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:26.448000 audit[5217]: CRED_ACQ pid=5217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.448000 audit[5217]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf3f4c860 a2=3 a3=0 items=0 ppid=1 pid=5217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:26.448000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:26.449360 sshd[5217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:26.452481 systemd[1]: Started session-14.scope. Feb 12 22:16:26.452661 systemd-logind[1142]: New session 14 of user core. Feb 12 22:16:26.454000 audit[5217]: USER_START pid=5217 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:26.455000 audit[5220]: CRED_ACQ pid=5220 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.495495 systemd[1]: Started sshd@45-139.178.70.100:22-139.178.89.65:52232.service. Feb 12 22:16:27.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.100:22-139.178.89.65:52232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:27.497864 sshd[5217]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:27.503000 audit[5217]: USER_END pid=5217 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.505000 audit[5217]: CRED_DISP pid=5217 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.514065 systemd[1]: sshd@44-139.178.70.100:22-139.178.89.65:52216.service: Deactivated successfully. Feb 12 22:16:27.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.100:22-139.178.89.65:52216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:27.514624 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 22:16:27.515154 systemd-logind[1142]: Session 14 logged out. Waiting for processes to exit. Feb 12 22:16:27.515621 systemd-logind[1142]: Removed session 14. Feb 12 22:16:27.558000 audit[5228]: USER_ACCT pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.559280 sshd[5228]: Accepted publickey for core from 139.178.89.65 port 52232 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:27.559000 audit[5228]: CRED_ACQ pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.559000 audit[5228]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeef9d71d0 a2=3 a3=0 items=0 ppid=1 pid=5228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:27.559000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:27.561032 sshd[5228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:27.565501 systemd[1]: Started session-15.scope. Feb 12 22:16:27.565598 systemd-logind[1142]: New session 15 of user core. Feb 12 22:16:27.568000 audit[5228]: USER_START pid=5228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.568000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.734856 sshd[5228]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:27.734000 audit[5228]: USER_END pid=5228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.734000 audit[5228]: CRED_DISP pid=5228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:27.736478 systemd[1]: sshd@45-139.178.70.100:22-139.178.89.65:52232.service: Deactivated successfully. Feb 12 22:16:27.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.100:22-139.178.89.65:52232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:27.736940 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 22:16:27.737191 systemd-logind[1142]: Session 15 logged out. Waiting for processes to exit. Feb 12 22:16:27.737624 systemd-logind[1142]: Removed session 15. Feb 12 22:16:29.058572 systemd[1]: run-containerd-runc-k8s.io-678d5228376245b712b30244f90fce80bb25ff11441a8dd9afe7b7d1adcf6340-runc.4XLfst.mount: Deactivated successfully. Feb 12 22:16:29.061281 systemd[1]: run-containerd-runc-k8s.io-cffd4bd52c2276f90c6ddfd5cde2bd4487e6de64f929cf248f0eeda3c0214c3a-runc.9xw0To.mount: Deactivated successfully. Feb 12 22:16:29.281000 audit[5308]: NETFILTER_CFG table=filter:131 family=2 entries=7 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:29.281000 audit[5308]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe8a728290 a2=0 a3=7ffe8a72827c items=0 ppid=2389 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:29.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:29.284000 audit[5308]: NETFILTER_CFG table=nat:132 family=2 entries=89 op=nft_register_chain pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:29.284000 audit[5308]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe8a728290 a2=0 a3=7ffe8a72827c items=0 ppid=2389 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:29.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:29.307000 audit[5334]: NETFILTER_CFG table=filter:133 family=2 entries=6 op=nft_register_rule pid=5334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:29.307000 audit[5334]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffea6352b0 a2=0 a3=7fffea63529c items=0 ppid=2389 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:29.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:29.308000 audit[5334]: NETFILTER_CFG table=nat:134 family=2 entries=94 op=nft_register_rule pid=5334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:29.308000 audit[5334]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fffea6352b0 a2=0 a3=7fffea63529c items=0 ppid=2389 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:29.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:32.738171 systemd[1]: Started sshd@46-139.178.70.100:22-139.178.89.65:53968.service. Feb 12 22:16:32.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.100:22-139.178.89.65:53968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:32.739967 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 12 22:16:32.740119 kernel: audit: type=1130 audit(1707776192.737:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.100:22-139.178.89.65:53968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:32.799196 sshd[5341]: Accepted publickey for core from 139.178.89.65 port 53968 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:32.798000 audit[5341]: USER_ACCT pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.800000 audit[5341]: CRED_ACQ pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.807452 kernel: audit: type=1101 audit(1707776192.798:1509): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.807501 kernel: audit: type=1103 audit(1707776192.800:1510): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.808385 kernel: audit: type=1006 audit(1707776192.800:1511): pid=5341 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 22:16:32.808169 sshd[5341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:32.810003 kernel: audit: type=1300 audit(1707776192.800:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd160a3b20 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:32.800000 audit[5341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd160a3b20 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:32.800000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:32.815854 kernel: audit: type=1327 audit(1707776192.800:1511): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:32.817632 systemd[1]: Started session-16.scope. Feb 12 22:16:32.817763 systemd-logind[1142]: New session 16 of user core. Feb 12 22:16:32.819000 audit[5341]: USER_START pid=5341 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.823000 audit[5343]: CRED_ACQ pid=5343 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.827379 kernel: audit: type=1105 audit(1707776192.819:1512): pid=5341 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.827411 kernel: audit: type=1103 audit(1707776192.823:1513): pid=5343 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.968936 sshd[5341]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:32.968000 audit[5341]: USER_END pid=5341 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.973605 systemd[1]: sshd@46-139.178.70.100:22-139.178.89.65:53968.service: Deactivated successfully. Feb 12 22:16:32.973852 kernel: audit: type=1106 audit(1707776192.968:1514): pid=5341 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.968000 audit[5341]: CRED_DISP pid=5341 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.974119 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 22:16:32.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.100:22-139.178.89.65:53968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:32.977488 systemd-logind[1142]: Session 16 logged out. Waiting for processes to exit. Feb 12 22:16:32.977853 kernel: audit: type=1104 audit(1707776192.968:1515): pid=5341 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:32.978149 systemd-logind[1142]: Removed session 16. Feb 12 22:16:36.690881 sshd[5158]: Connection closed by 162.142.125.216 port 33892 [preauth] Feb 12 22:16:36.692077 systemd[1]: sshd@42-139.178.70.100:22-162.142.125.216:33892.service: Deactivated successfully. Feb 12 22:16:36.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.100:22-162.142.125.216:33892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:36.829000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:36.829000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:36.829000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013bc300 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:16:36.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:36.829000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000c54080 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:16:36.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:37.356000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:37.356000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:37.356000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0134bd980 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:16:37.356000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:16:37.356000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c002db2e60 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:16:37.356000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:16:37.359000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6507 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:37.359000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c013625230 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:16:37.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:16:37.359000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6513 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:37.359000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0134bda10 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:16:37.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:16:37.363000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6511 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:37.363000 audit[2037]: AVC avc: denied { watch } for pid=2037 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:37.363000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c002db2f60 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:16:37.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:16:37.363000 audit[2037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0134bdb00 a2=fc6 a3=0 items=0 ppid=1918 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c852 key=(null) Feb 12 22:16:37.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 22:16:37.973044 systemd[1]: Started sshd@47-139.178.70.100:22-139.178.89.65:53980.service. Feb 12 22:16:37.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.100:22-139.178.89.65:53980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:37.978616 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 22:16:37.978681 kernel: audit: type=1130 audit(1707776197.972:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.100:22-139.178.89.65:53980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:38.015000 audit[5358]: USER_ACCT pid=5358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.018212 sshd[5358]: Accepted publickey for core from 139.178.89.65 port 53980 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:38.021561 sshd[5358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:38.020000 audit[5358]: CRED_ACQ pid=5358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.025723 kernel: audit: type=1101 audit(1707776198.015:1527): pid=5358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.025795 kernel: audit: type=1103 audit(1707776198.020:1528): pid=5358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.025820 kernel: audit: type=1006 audit(1707776198.020:1529): pid=5358 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 22:16:38.020000 audit[5358]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc86a1c8b0 a2=3 a3=0 items=0 ppid=1 pid=5358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:38.032245 kernel: audit: type=1300 audit(1707776198.020:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc86a1c8b0 a2=3 a3=0 items=0 ppid=1 pid=5358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:38.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:38.033628 kernel: audit: type=1327 audit(1707776198.020:1529): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:38.035574 systemd-logind[1142]: New session 17 of user core. Feb 12 22:16:38.036101 systemd[1]: Started session-17.scope. Feb 12 22:16:38.038000 audit[5358]: USER_START pid=5358 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.043113 kernel: audit: type=1105 audit(1707776198.038:1530): pid=5358 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.043148 kernel: audit: type=1103 audit(1707776198.042:1531): pid=5360 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.042000 audit[5360]: CRED_ACQ pid=5360 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.164585 sshd[5358]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:38.164000 audit[5358]: USER_END pid=5358 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.169000 audit[5358]: CRED_DISP pid=5358 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.172478 kernel: audit: type=1106 audit(1707776198.164:1532): pid=5358 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.172846 kernel: audit: type=1104 audit(1707776198.169:1533): pid=5358 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:38.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.100:22-139.178.89.65:53980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:38.173439 systemd-logind[1142]: Session 17 logged out. Waiting for processes to exit. Feb 12 22:16:38.173533 systemd[1]: sshd@47-139.178.70.100:22-139.178.89.65:53980.service: Deactivated successfully. Feb 12 22:16:38.173982 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 22:16:38.174588 systemd-logind[1142]: Removed session 17. Feb 12 22:16:40.034196 systemd[1]: Started sshd@48-139.178.70.100:22-101.42.7.118:38556.service. Feb 12 22:16:40.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.100:22-101.42.7.118:38556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:40.425000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:40.425000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c54740 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:16:40.425000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:40.425000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:40.425000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c54760 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:16:40.425000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:40.443000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:40.443000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebaac0 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:16:40.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:40.443000 audit[2061]: AVC avc: denied { watch } for pid=2061 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:16:40.443000 audit[2061]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebab00 a2=fc6 a3=0 items=0 ppid=1899 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c290 key=(null) Feb 12 22:16:40.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:16:40.970165 sshd[5372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:16:40.969000 audit[5372]: USER_AUTH pid=5372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:16:41.814545 systemd[1]: Started sshd@49-139.178.70.100:22-124.220.29.33:47054.service. Feb 12 22:16:41.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.100:22-124.220.29.33:47054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:43.120949 sshd[5372]: Failed password for root from 101.42.7.118 port 38556 ssh2 Feb 12 22:16:43.171219 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 12 22:16:43.171324 kernel: audit: type=1130 audit(1707776203.166:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.100:22-139.178.89.65:34658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:43.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.100:22-139.178.89.65:34658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:43.166836 systemd[1]: Started sshd@50-139.178.70.100:22-139.178.89.65:34658.service. Feb 12 22:16:43.198000 audit[5380]: USER_ACCT pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.200223 sshd[5380]: Accepted publickey for core from 139.178.89.65 port 34658 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:43.204864 kernel: audit: type=1101 audit(1707776203.198:1543): pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.204000 audit[5380]: CRED_ACQ pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.206766 sshd[5380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:43.211875 kernel: audit: type=1103 audit(1707776203.204:1544): pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.211919 kernel: audit: type=1006 audit(1707776203.204:1545): pid=5380 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 22:16:43.204000 audit[5380]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeead31ba0 a2=3 a3=0 items=0 ppid=1 pid=5380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:43.216128 kernel: audit: type=1300 audit(1707776203.204:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeead31ba0 a2=3 a3=0 items=0 ppid=1 pid=5380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:43.204000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:43.217533 kernel: audit: type=1327 audit(1707776203.204:1545): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:43.219902 systemd[1]: Started session-18.scope. Feb 12 22:16:43.220480 systemd-logind[1142]: New session 18 of user core. Feb 12 22:16:43.222000 audit[5380]: USER_START pid=5380 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.223000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.230141 kernel: audit: type=1105 audit(1707776203.222:1546): pid=5380 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.230548 kernel: audit: type=1103 audit(1707776203.223:1547): pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.305770 systemd[1]: run-containerd-runc-k8s.io-99397e7ef7489ff656d3afa14c215ab7eaadc86aa1103a3ba7c5aea104de5a4e-runc.AoqLVZ.mount: Deactivated successfully. Feb 12 22:16:43.396123 systemd[1]: Started sshd@51-139.178.70.100:22-188.166.160.119:60588.service. Feb 12 22:16:43.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.100:22-188.166.160.119:60588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:43.400850 kernel: audit: type=1130 audit(1707776203.395:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.100:22-188.166.160.119:60588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:43.431708 sshd[5380]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:43.432000 audit[5380]: USER_END pid=5380 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.435119 systemd[1]: sshd@50-139.178.70.100:22-139.178.89.65:34658.service: Deactivated successfully. Feb 12 22:16:43.435725 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 22:16:43.438867 kernel: audit: type=1106 audit(1707776203.432:1549): pid=5380 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.438986 systemd-logind[1142]: Session 18 logged out. Waiting for processes to exit. Feb 12 22:16:43.433000 audit[5380]: CRED_DISP pid=5380 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:43.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.100:22-139.178.89.65:34658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:43.439646 systemd-logind[1142]: Removed session 18. Feb 12 22:16:44.286727 sshd[5409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.160.119 user=root Feb 12 22:16:44.285000 audit[5409]: USER_AUTH pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=188.166.160.119 addr=188.166.160.119 terminal=ssh res=failed' Feb 12 22:16:44.558052 sshd[5372]: Received disconnect from 101.42.7.118 port 38556:11: Bye Bye [preauth] Feb 12 22:16:44.558052 sshd[5372]: Disconnected from authenticating user root 101.42.7.118 port 38556 [preauth] Feb 12 22:16:44.558201 systemd[1]: sshd@48-139.178.70.100:22-101.42.7.118:38556.service: Deactivated successfully. Feb 12 22:16:44.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.100:22-101.42.7.118:38556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:44.593928 systemd[1]: Started sshd@52-139.178.70.100:22-187.190.112.180:34991.service. Feb 12 22:16:44.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.100:22-187.190.112.180:34991 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:44.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.70.100:22-51.77.245.237:48146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:44.752165 systemd[1]: Started sshd@53-139.178.70.100:22-51.77.245.237:48146.service. Feb 12 22:16:45.066959 sshd[5414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.112.180 user=root Feb 12 22:16:45.066000 audit[5414]: USER_AUTH pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=187.190.112.180 addr=187.190.112.180 terminal=ssh res=failed' Feb 12 22:16:45.532113 sshd[5417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.237 user=root Feb 12 22:16:45.531000 audit[5417]: USER_AUTH pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=51.77.245.237 addr=51.77.245.237 terminal=ssh res=failed' Feb 12 22:16:45.654655 sshd[5409]: Failed password for root from 188.166.160.119 port 60588 ssh2 Feb 12 22:16:46.158481 sshd[5409]: Received disconnect from 188.166.160.119 port 60588:11: Bye Bye [preauth] Feb 12 22:16:46.159170 sshd[5409]: Disconnected from authenticating user root 188.166.160.119 port 60588 [preauth] Feb 12 22:16:46.159552 systemd[1]: sshd@51-139.178.70.100:22-188.166.160.119:60588.service: Deactivated successfully. Feb 12 22:16:46.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.100:22-188.166.160.119:60588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:46.570703 sshd[5414]: Failed password for root from 187.190.112.180 port 34991 ssh2 Feb 12 22:16:46.856411 sshd[5414]: Received disconnect from 187.190.112.180 port 34991:11: Bye Bye [preauth] Feb 12 22:16:46.856411 sshd[5414]: Disconnected from authenticating user root 187.190.112.180 port 34991 [preauth] Feb 12 22:16:46.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.100:22-187.190.112.180:34991 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:46.857115 systemd[1]: sshd@52-139.178.70.100:22-187.190.112.180:34991.service: Deactivated successfully. Feb 12 22:16:47.035496 sshd[5417]: Failed password for root from 51.77.245.237 port 48146 ssh2 Feb 12 22:16:47.391267 sshd[5417]: Received disconnect from 51.77.245.237 port 48146:11: Bye Bye [preauth] Feb 12 22:16:47.391267 sshd[5417]: Disconnected from authenticating user root 51.77.245.237 port 48146 [preauth] Feb 12 22:16:47.392060 systemd[1]: sshd@53-139.178.70.100:22-51.77.245.237:48146.service: Deactivated successfully. Feb 12 22:16:47.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.70.100:22-51.77.245.237:48146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:48.434485 systemd[1]: Started sshd@54-139.178.70.100:22-139.178.89.65:58816.service. Feb 12 22:16:48.440373 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 12 22:16:48.440422 kernel: audit: type=1130 audit(1707776208.433:1561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.70.100:22-139.178.89.65:58816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:48.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.70.100:22-139.178.89.65:58816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:48.471853 sshd[5429]: Accepted publickey for core from 139.178.89.65 port 58816 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:48.470000 audit[5429]: USER_ACCT pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.476846 kernel: audit: type=1101 audit(1707776208.470:1562): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.477043 sshd[5429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:48.476000 audit[5429]: CRED_ACQ pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.484054 kernel: audit: type=1103 audit(1707776208.476:1563): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.484095 kernel: audit: type=1006 audit(1707776208.476:1564): pid=5429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 22:16:48.476000 audit[5429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa0f2de0 a2=3 a3=0 items=0 ppid=1 pid=5429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:48.488085 kernel: audit: type=1300 audit(1707776208.476:1564): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa0f2de0 a2=3 a3=0 items=0 ppid=1 pid=5429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:48.488306 kernel: audit: type=1327 audit(1707776208.476:1564): proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:48.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:48.492362 systemd[1]: Started session-19.scope. Feb 12 22:16:48.493020 systemd-logind[1142]: New session 19 of user core. Feb 12 22:16:48.495000 audit[5429]: USER_START pid=5429 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.499000 audit[5431]: CRED_ACQ pid=5431 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.502565 kernel: audit: type=1105 audit(1707776208.495:1565): pid=5429 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.502601 kernel: audit: type=1103 audit(1707776208.499:1566): pid=5431 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.612456 sshd[5429]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:48.614000 audit[5429]: USER_END pid=5429 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.614000 audit[5429]: CRED_DISP pid=5429 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.618966 systemd[1]: Started sshd@55-139.178.70.100:22-139.178.89.65:58820.service. Feb 12 22:16:48.619631 systemd[1]: sshd@54-139.178.70.100:22-139.178.89.65:58816.service: Deactivated successfully. Feb 12 22:16:48.620172 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 22:16:48.621550 kernel: audit: type=1106 audit(1707776208.614:1567): pid=5429 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.621870 kernel: audit: type=1104 audit(1707776208.614:1568): pid=5429 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.622758 systemd-logind[1142]: Session 19 logged out. Waiting for processes to exit. Feb 12 22:16:48.624359 systemd-logind[1142]: Removed session 19. Feb 12 22:16:48.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.70.100:22-139.178.89.65:58820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:48.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.70.100:22-139.178.89.65:58816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:48.653000 audit[5440]: USER_ACCT pid=5440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.654912 sshd[5440]: Accepted publickey for core from 139.178.89.65 port 58820 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:48.654000 audit[5440]: CRED_ACQ pid=5440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.654000 audit[5440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3a426ab0 a2=3 a3=0 items=0 ppid=1 pid=5440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:48.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:48.656042 sshd[5440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:48.659776 systemd[1]: Started session-20.scope. Feb 12 22:16:48.660308 systemd-logind[1142]: New session 20 of user core. Feb 12 22:16:48.663000 audit[5440]: USER_START pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:48.664000 audit[5443]: CRED_ACQ pid=5443 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.031965 systemd[1]: Started sshd@56-139.178.70.100:22-139.178.89.65:58830.service. Feb 12 22:16:49.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.70.100:22-139.178.89.65:58830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:49.035579 sshd[5440]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:49.039000 audit[5440]: USER_END pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.040000 audit[5440]: CRED_DISP pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.047822 systemd[1]: sshd@55-139.178.70.100:22-139.178.89.65:58820.service: Deactivated successfully. Feb 12 22:16:49.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.70.100:22-139.178.89.65:58820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:49.048384 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 22:16:49.049139 systemd-logind[1142]: Session 20 logged out. Waiting for processes to exit. Feb 12 22:16:49.051213 systemd-logind[1142]: Removed session 20. Feb 12 22:16:49.082000 audit[5450]: USER_ACCT pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.083858 sshd[5450]: Accepted publickey for core from 139.178.89.65 port 58830 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:49.083000 audit[5450]: CRED_ACQ pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.083000 audit[5450]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe653a7080 a2=3 a3=0 items=0 ppid=1 pid=5450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:49.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:49.085121 sshd[5450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:49.092216 systemd[1]: Started session-21.scope. Feb 12 22:16:49.092882 systemd-logind[1142]: New session 21 of user core. Feb 12 22:16:49.096000 audit[5450]: USER_START pid=5450 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.097000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:49.558473 systemd[1]: Started sshd@57-139.178.70.100:22-130.61.232.86:62514.service. Feb 12 22:16:49.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.70.100:22-130.61.232.86:62514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:50.372599 sshd[5459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 user=root Feb 12 22:16:50.371000 audit[5459]: USER_AUTH pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=130.61.232.86 addr=130.61.232.86 terminal=ssh res=failed' Feb 12 22:16:50.838907 sshd[5450]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:50.841342 systemd[1]: Started sshd@58-139.178.70.100:22-139.178.89.65:58838.service. Feb 12 22:16:50.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.70.100:22-139.178.89.65:58838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:50.844000 audit[5450]: USER_END pid=5450 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:50.846000 audit[5450]: CRED_DISP pid=5450 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:50.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.70.100:22-139.178.89.65:58830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:50.847797 systemd[1]: sshd@56-139.178.70.100:22-139.178.89.65:58830.service: Deactivated successfully. Feb 12 22:16:50.848370 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 22:16:50.849119 systemd-logind[1142]: Session 21 logged out. Waiting for processes to exit. Feb 12 22:16:50.852318 systemd-logind[1142]: Removed session 21. Feb 12 22:16:50.903000 audit[5498]: NETFILTER_CFG table=filter:135 family=2 entries=18 op=nft_register_rule pid=5498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:50.903000 audit[5498]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fff32c08010 a2=0 a3=7fff32c07ffc items=0 ppid=2389 pid=5498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:50.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:50.905000 audit[5471]: USER_ACCT pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:50.906000 audit[5471]: CRED_ACQ pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:50.906000 audit[5471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd53a54d20 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:50.906000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:50.906000 audit[5498]: NETFILTER_CFG table=nat:136 family=2 entries=94 op=nft_register_rule pid=5498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:50.906000 audit[5498]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fff32c08010 a2=0 a3=7fff32c07ffc items=0 ppid=2389 pid=5498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:50.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:50.913000 audit[5471]: USER_START pid=5471 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:50.914000 audit[5501]: CRED_ACQ pid=5501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:50.916783 sshd[5471]: Accepted publickey for core from 139.178.89.65 port 58838 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:50.907640 sshd[5471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:50.910982 systemd[1]: Started session-22.scope. Feb 12 22:16:50.911515 systemd-logind[1142]: New session 22 of user core. Feb 12 22:16:50.946000 audit[5525]: NETFILTER_CFG table=filter:137 family=2 entries=30 op=nft_register_rule pid=5525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:50.946000 audit[5525]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe3e3ec6a0 a2=0 a3=7ffe3e3ec68c items=0 ppid=2389 pid=5525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:50.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:50.947000 audit[5525]: NETFILTER_CFG table=nat:138 family=2 entries=94 op=nft_register_rule pid=5525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:50.947000 audit[5525]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe3e3ec6a0 a2=0 a3=7ffe3e3ec68c items=0 ppid=2389 pid=5525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:50.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:51.488008 systemd[1]: Started sshd@59-139.178.70.100:22-139.178.89.65:58846.service. Feb 12 22:16:51.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.70.100:22-139.178.89.65:58846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:51.494099 sshd[5471]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:51.498000 audit[5471]: USER_END pid=5471 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.499000 audit[5471]: CRED_DISP pid=5471 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.505088 systemd[1]: sshd@58-139.178.70.100:22-139.178.89.65:58838.service: Deactivated successfully. Feb 12 22:16:51.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.70.100:22-139.178.89.65:58838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:51.505593 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 22:16:51.507104 systemd-logind[1142]: Session 22 logged out. Waiting for processes to exit. Feb 12 22:16:51.508004 systemd-logind[1142]: Removed session 22. Feb 12 22:16:51.539000 audit[5533]: USER_ACCT pid=5533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.540346 sshd[5533]: Accepted publickey for core from 139.178.89.65 port 58846 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:51.540000 audit[5533]: CRED_ACQ pid=5533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.540000 audit[5533]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3cb9e450 a2=3 a3=0 items=0 ppid=1 pid=5533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:51.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:51.541607 sshd[5533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:51.545152 systemd-logind[1142]: New session 23 of user core. Feb 12 22:16:51.545660 systemd[1]: Started session-23.scope. Feb 12 22:16:51.548000 audit[5533]: USER_START pid=5533 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.549000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.654744 sshd[5533]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:51.654000 audit[5533]: USER_END pid=5533 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.654000 audit[5533]: CRED_DISP pid=5533 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:51.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.70.100:22-139.178.89.65:58846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:51.656241 systemd-logind[1142]: Session 23 logged out. Waiting for processes to exit. Feb 12 22:16:51.656326 systemd[1]: sshd@59-139.178.70.100:22-139.178.89.65:58846.service: Deactivated successfully. Feb 12 22:16:51.656745 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 22:16:51.657495 systemd-logind[1142]: Removed session 23. Feb 12 22:16:52.562980 sshd[5459]: Failed password for root from 130.61.232.86 port 62514 ssh2 Feb 12 22:16:53.188454 systemd[1]: Started sshd@60-139.178.70.100:22-14.102.74.99:35176.service. Feb 12 22:16:53.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.70.100:22-14.102.74.99:35176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:53.937821 sshd[5459]: Received disconnect from 130.61.232.86 port 62514:11: Bye Bye [preauth] Feb 12 22:16:53.937821 sshd[5459]: Disconnected from authenticating user root 130.61.232.86 port 62514 [preauth] Feb 12 22:16:53.944949 kernel: kauditd_printk_skb: 60 callbacks suppressed Feb 12 22:16:53.951975 kernel: audit: type=1131 audit(1707776213.938:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.70.100:22-130.61.232.86:62514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:53.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.70.100:22-130.61.232.86:62514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:53.938696 systemd[1]: sshd@57-139.178.70.100:22-130.61.232.86:62514.service: Deactivated successfully. Feb 12 22:16:54.650623 sshd[5546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99 user=root Feb 12 22:16:54.654194 kernel: audit: type=1100 audit(1707776214.649:1614): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.102.74.99 addr=14.102.74.99 terminal=ssh res=failed' Feb 12 22:16:54.649000 audit[5546]: USER_AUTH pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=14.102.74.99 addr=14.102.74.99 terminal=ssh res=failed' Feb 12 22:16:55.503129 systemd[1]: Started sshd@61-139.178.70.100:22-152.32.209.108:49260.service. Feb 12 22:16:55.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.70.100:22-152.32.209.108:49260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:55.507859 kernel: audit: type=1130 audit(1707776215.502:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.70.100:22-152.32.209.108:49260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:56.076000 audit[5600]: NETFILTER_CFG table=filter:139 family=2 entries=18 op=nft_register_rule pid=5600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:56.083394 kernel: audit: type=1325 audit(1707776216.076:1616): table=filter:139 family=2 entries=18 op=nft_register_rule pid=5600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:56.083432 kernel: audit: type=1300 audit(1707776216.076:1616): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc6e3cf310 a2=0 a3=7ffc6e3cf2fc items=0 ppid=2389 pid=5600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:56.083450 kernel: audit: type=1327 audit(1707776216.076:1616): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:56.076000 audit[5600]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc6e3cf310 a2=0 a3=7ffc6e3cf2fc items=0 ppid=2389 pid=5600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:56.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:56.082000 audit[5600]: NETFILTER_CFG table=nat:140 family=2 entries=178 op=nft_register_chain pid=5600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:56.087593 kernel: audit: type=1325 audit(1707776216.082:1617): table=nat:140 family=2 entries=178 op=nft_register_chain pid=5600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:16:56.091472 kernel: audit: type=1300 audit(1707776216.082:1617): arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffc6e3cf310 a2=0 a3=7ffc6e3cf2fc items=0 ppid=2389 pid=5600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:56.091497 kernel: audit: type=1327 audit(1707776216.082:1617): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:56.082000 audit[5600]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffc6e3cf310 a2=0 a3=7ffc6e3cf2fc items=0 ppid=2389 pid=5600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:56.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:16:56.398635 sshd[5573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.209.108 user=root Feb 12 22:16:56.403317 kernel: audit: type=1100 audit(1707776216.397:1618): pid=5573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=152.32.209.108 addr=152.32.209.108 terminal=ssh res=failed' Feb 12 22:16:56.397000 audit[5573]: USER_AUTH pid=5573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=152.32.209.108 addr=152.32.209.108 terminal=ssh res=failed' Feb 12 22:16:56.658439 systemd[1]: Started sshd@62-139.178.70.100:22-139.178.89.65:58850.service. Feb 12 22:16:56.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.70.100:22-139.178.89.65:58850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:56.691000 audit[5603]: USER_ACCT pid=5603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:56.692594 sshd[5603]: Accepted publickey for core from 139.178.89.65 port 58850 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:16:56.692000 audit[5603]: CRED_ACQ pid=5603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:56.692000 audit[5603]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc265b3230 a2=3 a3=0 items=0 ppid=1 pid=5603 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:16:56.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:16:56.694164 sshd[5603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:16:56.698208 systemd-logind[1142]: New session 24 of user core. Feb 12 22:16:56.698836 systemd[1]: Started session-24.scope. Feb 12 22:16:56.702000 audit[5603]: USER_START pid=5603 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:56.702000 audit[5605]: CRED_ACQ pid=5605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:56.721575 sshd[5546]: Failed password for root from 14.102.74.99 port 35176 ssh2 Feb 12 22:16:56.871684 sshd[5603]: pam_unix(sshd:session): session closed for user core Feb 12 22:16:56.871000 audit[5603]: USER_END pid=5603 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:56.871000 audit[5603]: CRED_DISP pid=5603 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:16:56.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.70.100:22-139.178.89.65:58850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:56.873381 systemd-logind[1142]: Session 24 logged out. Waiting for processes to exit. Feb 12 22:16:56.873471 systemd[1]: sshd@62-139.178.70.100:22-139.178.89.65:58850.service: Deactivated successfully. Feb 12 22:16:56.873969 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 22:16:56.874702 systemd-logind[1142]: Removed session 24. Feb 12 22:16:57.746123 sshd[5573]: Failed password for root from 152.32.209.108 port 49260 ssh2 Feb 12 22:16:57.881284 systemd[1]: Started sshd@63-139.178.70.100:22-213.74.115.162:58286.service. Feb 12 22:16:57.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.70.100:22-213.74.115.162:58286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:58.255263 sshd[5573]: Received disconnect from 152.32.209.108 port 49260:11: Bye Bye [preauth] Feb 12 22:16:58.255263 sshd[5573]: Disconnected from authenticating user root 152.32.209.108 port 49260 [preauth] Feb 12 22:16:58.256319 systemd[1]: sshd@61-139.178.70.100:22-152.32.209.108:49260.service: Deactivated successfully. Feb 12 22:16:58.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.70.100:22-152.32.209.108:49260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:58.351843 sshd[5546]: Received disconnect from 14.102.74.99 port 35176:11: Bye Bye [preauth] Feb 12 22:16:58.351843 sshd[5546]: Disconnected from authenticating user root 14.102.74.99 port 35176 [preauth] Feb 12 22:16:58.352442 systemd[1]: sshd@60-139.178.70.100:22-14.102.74.99:35176.service: Deactivated successfully. Feb 12 22:16:58.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.70.100:22-14.102.74.99:35176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:16:58.922000 audit[5614]: USER_AUTH pid=5614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=213.74.115.162 addr=213.74.115.162 terminal=ssh res=failed' Feb 12 22:16:58.923434 sshd[5614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.115.162 user=root Feb 12 22:17:00.878156 sshd[5614]: Failed password for root from 213.74.115.162 port 58286 ssh2 Feb 12 22:17:01.876124 systemd[1]: Started sshd@64-139.178.70.100:22-139.178.89.65:52952.service. Feb 12 22:17:01.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.70.100:22-139.178.89.65:52952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:01.877859 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 12 22:17:01.877914 kernel: audit: type=1130 audit(1707776221.875:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.70.100:22-139.178.89.65:52952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:01.925000 audit[5670]: USER_ACCT pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.935251 kernel: audit: type=1101 audit(1707776221.925:1633): pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.935349 kernel: audit: type=1103 audit(1707776221.930:1634): pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.930000 audit[5670]: CRED_ACQ pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.935432 sshd[5670]: Accepted publickey for core from 139.178.89.65 port 52952 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:17:01.942521 kernel: audit: type=1006 audit(1707776221.930:1635): pid=5670 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 22:17:01.942776 kernel: audit: type=1300 audit(1707776221.930:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce69d3180 a2=3 a3=0 items=0 ppid=1 pid=5670 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:17:01.930000 audit[5670]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce69d3180 a2=3 a3=0 items=0 ppid=1 pid=5670 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:17:01.935612 sshd[5670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:17:01.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:17:01.945168 kernel: audit: type=1327 audit(1707776221.930:1635): proctitle=737368643A20636F7265205B707269765D Feb 12 22:17:01.946701 systemd-logind[1142]: New session 25 of user core. Feb 12 22:17:01.947253 systemd[1]: Started session-25.scope. Feb 12 22:17:01.949000 audit[5670]: USER_START pid=5670 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.949000 audit[5672]: CRED_ACQ pid=5672 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.957009 kernel: audit: type=1105 audit(1707776221.949:1636): pid=5670 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:01.957048 kernel: audit: type=1103 audit(1707776221.949:1637): pid=5672 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:02.081309 sshd[5670]: pam_unix(sshd:session): session closed for user core Feb 12 22:17:02.081000 audit[5670]: USER_END pid=5670 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:02.082865 systemd[1]: sshd@64-139.178.70.100:22-139.178.89.65:52952.service: Deactivated successfully. Feb 12 22:17:02.083319 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 22:17:02.085852 kernel: audit: type=1106 audit(1707776222.081:1638): pid=5670 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:02.081000 audit[5670]: CRED_DISP pid=5670 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:02.089015 systemd-logind[1142]: Session 25 logged out. Waiting for processes to exit. Feb 12 22:17:02.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.70.100:22-139.178.89.65:52952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:02.089512 systemd-logind[1142]: Removed session 25. Feb 12 22:17:02.089840 kernel: audit: type=1104 audit(1707776222.081:1639): pid=5670 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:02.537946 sshd[5614]: Received disconnect from 213.74.115.162 port 58286:11: Bye Bye [preauth] Feb 12 22:17:02.537946 sshd[5614]: Disconnected from authenticating user root 213.74.115.162 port 58286 [preauth] Feb 12 22:17:02.539067 systemd[1]: sshd@63-139.178.70.100:22-213.74.115.162:58286.service: Deactivated successfully. Feb 12 22:17:02.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.70.100:22-213.74.115.162:58286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:02.894607 sshd[2890]: Timeout before authentication for 124.220.29.33 port 57814 Feb 12 22:17:02.895309 systemd[1]: sshd@25-139.178.70.100:22-124.220.29.33:57814.service: Deactivated successfully. Feb 12 22:17:02.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.100:22-124.220.29.33:57814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:03.539000 audit[4958]: AVC avc: denied { watch } for pid=4958 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_15_58.3456761415/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c870 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c71,c870 tclass=file permissive=0 Feb 12 22:17:03.539000 audit[4958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a5f160 a2=fc6 a3=0 items=0 ppid=4876 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c870 key=(null) Feb 12 22:17:03.539000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:17:03.790000 audit[5022]: AVC avc: denied { watch } for pid=5022 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_15_58.1325303809/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c246 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c246 tclass=file permissive=0 Feb 12 22:17:03.790000 audit[5022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001909840 a2=fc6 a3=0 items=0 ppid=4859 pid=5022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c246 key=(null) Feb 12 22:17:03.790000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:17:06.042588 systemd[1]: Started sshd@65-139.178.70.100:22-101.42.7.118:45762.service. Feb 12 22:17:06.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.70.100:22-101.42.7.118:45762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:07.084644 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 12 22:17:07.084742 kernel: audit: type=1130 audit(1707776227.082:1646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.70.100:22-139.178.89.65:52964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:07.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.70.100:22-139.178.89.65:52964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:07.083338 systemd[1]: Started sshd@66-139.178.70.100:22-139.178.89.65:52964.service. Feb 12 22:17:07.107798 sshd[5684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.42.7.118 user=root Feb 12 22:17:07.107000 audit[5684]: USER_AUTH pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:17:07.110846 kernel: audit: type=1100 audit(1707776227.107:1647): pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.42.7.118 addr=101.42.7.118 terminal=ssh res=failed' Feb 12 22:17:07.119000 audit[5687]: USER_ACCT pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.120627 sshd[5687]: Accepted publickey for core from 139.178.89.65 port 52964 ssh2: RSA SHA256:n37eHuYF7v0WclNa6GO/O49scDMiXmdvJEdKIfiDMLU Feb 12 22:17:07.124886 kernel: audit: type=1101 audit(1707776227.119:1648): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.124000 audit[5687]: CRED_ACQ pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.126998 sshd[5687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:17:07.132868 kernel: audit: type=1103 audit(1707776227.124:1649): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.132952 kernel: audit: type=1006 audit(1707776227.125:1650): pid=5687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 22:17:07.133525 kernel: audit: type=1300 audit(1707776227.125:1650): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe60da6e50 a2=3 a3=0 items=0 ppid=1 pid=5687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:17:07.125000 audit[5687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe60da6e50 a2=3 a3=0 items=0 ppid=1 pid=5687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:17:07.139301 kernel: audit: type=1327 audit(1707776227.125:1650): proctitle=737368643A20636F7265205B707269765D Feb 12 22:17:07.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:17:07.138709 systemd[1]: Started session-26.scope. Feb 12 22:17:07.139038 systemd-logind[1142]: New session 26 of user core. Feb 12 22:17:07.142000 audit[5687]: USER_START pid=5687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.143000 audit[5689]: CRED_ACQ pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.150114 kernel: audit: type=1105 audit(1707776227.142:1651): pid=5687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.150150 kernel: audit: type=1103 audit(1707776227.143:1652): pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.267929 sshd[5687]: pam_unix(sshd:session): session closed for user core Feb 12 22:17:07.267000 audit[5687]: USER_END pid=5687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.269669 systemd[1]: sshd@66-139.178.70.100:22-139.178.89.65:52964.service: Deactivated successfully. Feb 12 22:17:07.270120 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 22:17:07.272866 kernel: audit: type=1106 audit(1707776227.267:1653): pid=5687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.267000 audit[5687]: CRED_DISP pid=5687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:17:07.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.70.100:22-139.178.89.65:52964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:17:07.273086 systemd-logind[1142]: Session 26 logged out. Waiting for processes to exit. Feb 12 22:17:07.273787 systemd-logind[1142]: Removed session 26. Feb 12 22:17:09.301344 sshd[5684]: Failed password for root from 101.42.7.118 port 45762 ssh2