Apr 12 18:40:54.673559 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:40:54.673574 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:40:54.673581 kernel: Disabled fast string operations Apr 12 18:40:54.673585 kernel: BIOS-provided physical RAM map: Apr 12 18:40:54.673588 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Apr 12 18:40:54.673592 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Apr 12 18:40:54.673598 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Apr 12 18:40:54.673602 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Apr 12 18:40:54.673606 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Apr 12 18:40:54.673610 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Apr 12 18:40:54.673614 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Apr 12 18:40:54.673618 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Apr 12 18:40:54.673622 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Apr 12 18:40:54.673626 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 18:40:54.673632 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Apr 12 18:40:54.673637 kernel: NX (Execute Disable) protection: active Apr 12 18:40:54.673641 kernel: SMBIOS 2.7 present. Apr 12 18:40:54.673646 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Apr 12 18:40:54.673650 kernel: vmware: hypercall mode: 0x00 Apr 12 18:40:54.673655 kernel: Hypervisor detected: VMware Apr 12 18:40:54.673660 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Apr 12 18:40:54.673664 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Apr 12 18:40:54.673669 kernel: vmware: using clock offset of 3228414746 ns Apr 12 18:40:54.673673 kernel: tsc: Detected 3408.000 MHz processor Apr 12 18:40:54.673678 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:40:54.673683 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:40:54.673687 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Apr 12 18:40:54.673692 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:40:54.673696 kernel: total RAM covered: 3072M Apr 12 18:40:54.673712 kernel: Found optimal setting for mtrr clean up Apr 12 18:40:54.673729 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Apr 12 18:40:54.673734 kernel: Using GB pages for direct mapping Apr 12 18:40:54.673739 kernel: ACPI: Early table checksum verification disabled Apr 12 18:40:54.673743 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Apr 12 18:40:54.673748 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Apr 12 18:40:54.673752 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Apr 12 18:40:54.673757 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Apr 12 18:40:54.673761 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Apr 12 18:40:54.673766 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Apr 12 18:40:54.673772 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Apr 12 18:40:54.673779 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Apr 12 18:40:54.673784 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Apr 12 18:40:54.673789 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Apr 12 18:40:54.673794 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Apr 12 18:40:54.673800 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Apr 12 18:40:54.673805 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Apr 12 18:40:54.673809 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Apr 12 18:40:54.673814 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Apr 12 18:40:54.673819 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Apr 12 18:40:54.673824 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Apr 12 18:40:54.673829 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Apr 12 18:40:54.673834 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Apr 12 18:40:54.673838 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Apr 12 18:40:54.673844 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Apr 12 18:40:54.673849 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Apr 12 18:40:54.673854 kernel: system APIC only can use physical flat Apr 12 18:40:54.673858 kernel: Setting APIC routing to physical flat. Apr 12 18:40:54.673863 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:40:54.673868 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Apr 12 18:40:54.673873 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Apr 12 18:40:54.673877 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Apr 12 18:40:54.673882 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Apr 12 18:40:54.673887 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Apr 12 18:40:54.673892 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Apr 12 18:40:54.673897 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Apr 12 18:40:54.673902 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Apr 12 18:40:54.673907 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Apr 12 18:40:54.673912 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Apr 12 18:40:54.673916 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Apr 12 18:40:54.673921 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Apr 12 18:40:54.673926 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Apr 12 18:40:54.673931 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Apr 12 18:40:54.673936 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Apr 12 18:40:54.673941 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Apr 12 18:40:54.673946 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Apr 12 18:40:54.673951 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Apr 12 18:40:54.673955 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Apr 12 18:40:54.673960 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Apr 12 18:40:54.673965 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Apr 12 18:40:54.673970 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Apr 12 18:40:54.673974 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Apr 12 18:40:54.673979 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Apr 12 18:40:54.673985 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Apr 12 18:40:54.673989 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Apr 12 18:40:54.673994 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Apr 12 18:40:54.673999 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Apr 12 18:40:54.674004 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Apr 12 18:40:54.674008 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Apr 12 18:40:54.674013 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Apr 12 18:40:54.674018 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Apr 12 18:40:54.674023 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Apr 12 18:40:54.674028 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Apr 12 18:40:54.674033 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Apr 12 18:40:54.674039 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Apr 12 18:40:54.674043 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Apr 12 18:40:54.674048 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Apr 12 18:40:54.674053 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Apr 12 18:40:54.674058 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Apr 12 18:40:54.674063 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Apr 12 18:40:54.674067 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Apr 12 18:40:54.674072 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Apr 12 18:40:54.674077 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Apr 12 18:40:54.674083 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Apr 12 18:40:54.674087 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Apr 12 18:40:54.674092 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Apr 12 18:40:54.674097 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Apr 12 18:40:54.674102 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Apr 12 18:40:54.674107 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Apr 12 18:40:54.674111 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Apr 12 18:40:54.674116 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Apr 12 18:40:54.674121 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Apr 12 18:40:54.674126 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Apr 12 18:40:54.674131 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Apr 12 18:40:54.674136 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Apr 12 18:40:54.674141 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Apr 12 18:40:54.674146 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Apr 12 18:40:54.674150 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Apr 12 18:40:54.674156 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Apr 12 18:40:54.674164 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Apr 12 18:40:54.674170 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Apr 12 18:40:54.674175 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Apr 12 18:40:54.674180 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Apr 12 18:40:54.674186 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Apr 12 18:40:54.674191 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Apr 12 18:40:54.674196 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Apr 12 18:40:54.674201 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Apr 12 18:40:54.674206 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Apr 12 18:40:54.674211 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Apr 12 18:40:54.674217 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Apr 12 18:40:54.674222 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Apr 12 18:40:54.674228 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Apr 12 18:40:54.674233 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Apr 12 18:40:54.674238 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Apr 12 18:40:54.674243 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Apr 12 18:40:54.674248 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Apr 12 18:40:54.674254 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Apr 12 18:40:54.674259 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Apr 12 18:40:54.674264 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Apr 12 18:40:54.674269 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Apr 12 18:40:54.674274 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Apr 12 18:40:54.674280 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Apr 12 18:40:54.674285 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Apr 12 18:40:54.674290 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Apr 12 18:40:54.674295 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Apr 12 18:40:54.674300 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Apr 12 18:40:54.674305 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Apr 12 18:40:54.674310 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Apr 12 18:40:54.674315 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Apr 12 18:40:54.674320 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Apr 12 18:40:54.674325 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Apr 12 18:40:54.674331 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Apr 12 18:40:54.674336 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Apr 12 18:40:54.674341 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Apr 12 18:40:54.674346 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Apr 12 18:40:54.674352 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Apr 12 18:40:54.674357 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Apr 12 18:40:54.674362 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Apr 12 18:40:54.674367 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Apr 12 18:40:54.674372 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Apr 12 18:40:54.674378 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Apr 12 18:40:54.674383 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Apr 12 18:40:54.674388 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Apr 12 18:40:54.674393 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Apr 12 18:40:54.674398 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Apr 12 18:40:54.674403 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Apr 12 18:40:54.674408 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Apr 12 18:40:54.674413 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Apr 12 18:40:54.674418 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Apr 12 18:40:54.674423 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Apr 12 18:40:54.674429 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Apr 12 18:40:54.674435 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Apr 12 18:40:54.674440 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Apr 12 18:40:54.674445 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Apr 12 18:40:54.674450 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Apr 12 18:40:54.674455 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Apr 12 18:40:54.674460 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Apr 12 18:40:54.674465 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Apr 12 18:40:54.674470 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Apr 12 18:40:54.674475 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Apr 12 18:40:54.674481 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Apr 12 18:40:54.674486 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Apr 12 18:40:54.674491 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Apr 12 18:40:54.674496 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Apr 12 18:40:54.674501 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Apr 12 18:40:54.674506 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Apr 12 18:40:54.674511 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Apr 12 18:40:54.674517 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Apr 12 18:40:54.674522 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Apr 12 18:40:54.674527 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Apr 12 18:40:54.674533 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Apr 12 18:40:54.674539 kernel: Zone ranges: Apr 12 18:40:54.674544 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:40:54.674549 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Apr 12 18:40:54.674554 kernel: Normal empty Apr 12 18:40:54.674560 kernel: Movable zone start for each node Apr 12 18:40:54.674565 kernel: Early memory node ranges Apr 12 18:40:54.674570 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Apr 12 18:40:54.674575 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Apr 12 18:40:54.674581 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Apr 12 18:40:54.674586 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Apr 12 18:40:54.674591 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:40:54.674597 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Apr 12 18:40:54.674602 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Apr 12 18:40:54.674607 kernel: ACPI: PM-Timer IO Port: 0x1008 Apr 12 18:40:54.674612 kernel: system APIC only can use physical flat Apr 12 18:40:54.674617 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Apr 12 18:40:54.674622 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 18:40:54.674627 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 18:40:54.674634 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 18:40:54.674639 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 18:40:54.674644 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 18:40:54.674649 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 18:40:54.674654 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 18:40:54.674659 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 18:40:54.674664 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 18:40:54.674669 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 18:40:54.674675 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 18:40:54.674680 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 18:40:54.674686 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 18:40:54.674691 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 18:40:54.674696 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 18:40:54.674710 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 18:40:54.674716 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Apr 12 18:40:54.674721 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Apr 12 18:40:54.674726 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Apr 12 18:40:54.674731 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Apr 12 18:40:54.674737 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Apr 12 18:40:54.674743 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Apr 12 18:40:54.674748 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Apr 12 18:40:54.674753 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Apr 12 18:40:54.674758 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Apr 12 18:40:54.674763 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Apr 12 18:40:54.674768 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Apr 12 18:40:54.674773 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Apr 12 18:40:54.674779 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Apr 12 18:40:54.674784 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Apr 12 18:40:54.674790 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Apr 12 18:40:54.674795 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Apr 12 18:40:54.674800 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Apr 12 18:40:54.674805 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Apr 12 18:40:54.674810 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Apr 12 18:40:54.674815 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Apr 12 18:40:54.674820 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Apr 12 18:40:54.674825 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Apr 12 18:40:54.674830 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Apr 12 18:40:54.674837 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Apr 12 18:40:54.674842 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Apr 12 18:40:54.674847 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Apr 12 18:40:54.674852 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Apr 12 18:40:54.674857 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Apr 12 18:40:54.674862 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Apr 12 18:40:54.674868 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Apr 12 18:40:54.674873 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Apr 12 18:40:54.674878 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Apr 12 18:40:54.674883 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Apr 12 18:40:54.674889 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Apr 12 18:40:54.674895 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Apr 12 18:40:54.674900 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Apr 12 18:40:54.674905 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Apr 12 18:40:54.674910 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Apr 12 18:40:54.674915 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Apr 12 18:40:54.674920 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Apr 12 18:40:54.674925 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Apr 12 18:40:54.674930 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Apr 12 18:40:54.674936 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Apr 12 18:40:54.674941 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Apr 12 18:40:54.674947 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Apr 12 18:40:54.674952 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Apr 12 18:40:54.674957 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Apr 12 18:40:54.674962 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Apr 12 18:40:54.674967 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Apr 12 18:40:54.674972 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Apr 12 18:40:54.674977 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Apr 12 18:40:54.674982 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Apr 12 18:40:54.674989 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Apr 12 18:40:54.674994 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Apr 12 18:40:54.674999 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Apr 12 18:40:54.675004 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Apr 12 18:40:54.675009 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Apr 12 18:40:54.675014 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Apr 12 18:40:54.675019 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Apr 12 18:40:54.675025 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Apr 12 18:40:54.675030 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Apr 12 18:40:54.675036 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Apr 12 18:40:54.675041 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Apr 12 18:40:54.675046 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Apr 12 18:40:54.675051 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Apr 12 18:40:54.675057 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Apr 12 18:40:54.675062 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Apr 12 18:40:54.675067 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Apr 12 18:40:54.675072 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Apr 12 18:40:54.675078 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Apr 12 18:40:54.675083 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Apr 12 18:40:54.675089 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Apr 12 18:40:54.675094 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Apr 12 18:40:54.675099 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Apr 12 18:40:54.675104 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Apr 12 18:40:54.675110 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Apr 12 18:40:54.675115 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Apr 12 18:40:54.675121 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Apr 12 18:40:54.675129 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Apr 12 18:40:54.675134 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Apr 12 18:40:54.675141 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Apr 12 18:40:54.675146 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Apr 12 18:40:54.675151 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Apr 12 18:40:54.675156 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Apr 12 18:40:54.675161 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Apr 12 18:40:54.675166 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Apr 12 18:40:54.675171 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Apr 12 18:40:54.675177 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Apr 12 18:40:54.675182 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Apr 12 18:40:54.675187 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Apr 12 18:40:54.675193 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Apr 12 18:40:54.675198 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Apr 12 18:40:54.675203 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Apr 12 18:40:54.675208 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Apr 12 18:40:54.675213 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Apr 12 18:40:54.675219 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Apr 12 18:40:54.675224 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Apr 12 18:40:54.675229 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Apr 12 18:40:54.675235 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Apr 12 18:40:54.675241 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Apr 12 18:40:54.675246 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Apr 12 18:40:54.675251 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Apr 12 18:40:54.675256 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Apr 12 18:40:54.675261 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Apr 12 18:40:54.675267 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Apr 12 18:40:54.675272 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Apr 12 18:40:54.675277 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Apr 12 18:40:54.675282 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Apr 12 18:40:54.675288 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Apr 12 18:40:54.675293 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Apr 12 18:40:54.675298 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Apr 12 18:40:54.675304 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:40:54.675309 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Apr 12 18:40:54.675314 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:40:54.675319 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Apr 12 18:40:54.675325 kernel: TSC deadline timer available Apr 12 18:40:54.675330 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Apr 12 18:40:54.675335 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Apr 12 18:40:54.675341 kernel: Booting paravirtualized kernel on VMware hypervisor Apr 12 18:40:54.675347 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:40:54.675352 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Apr 12 18:40:54.675358 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 18:40:54.675363 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 18:40:54.675368 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Apr 12 18:40:54.675373 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Apr 12 18:40:54.675378 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Apr 12 18:40:54.675384 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Apr 12 18:40:54.675390 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Apr 12 18:40:54.675395 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Apr 12 18:40:54.675400 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Apr 12 18:40:54.675412 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Apr 12 18:40:54.675418 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Apr 12 18:40:54.675424 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Apr 12 18:40:54.675429 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Apr 12 18:40:54.675434 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Apr 12 18:40:54.675441 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Apr 12 18:40:54.675446 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Apr 12 18:40:54.675452 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Apr 12 18:40:54.675457 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Apr 12 18:40:54.675463 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Apr 12 18:40:54.675468 kernel: Policy zone: DMA32 Apr 12 18:40:54.675474 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:40:54.675480 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:40:54.675487 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Apr 12 18:40:54.675493 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Apr 12 18:40:54.675498 kernel: printk: log_buf_len min size: 262144 bytes Apr 12 18:40:54.675504 kernel: printk: log_buf_len: 1048576 bytes Apr 12 18:40:54.675510 kernel: printk: early log buf free: 239728(91%) Apr 12 18:40:54.675515 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:40:54.675521 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:40:54.675527 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:40:54.675532 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 155976K reserved, 0K cma-reserved) Apr 12 18:40:54.675539 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Apr 12 18:40:54.675545 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:40:54.675551 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:40:54.675557 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:40:54.675563 kernel: rcu: RCU event tracing is enabled. Apr 12 18:40:54.675568 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Apr 12 18:40:54.675575 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:40:54.675581 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:40:54.675586 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:40:54.675592 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Apr 12 18:40:54.675597 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Apr 12 18:40:54.675604 kernel: random: crng init done Apr 12 18:40:54.675609 kernel: Console: colour VGA+ 80x25 Apr 12 18:40:54.675615 kernel: printk: console [tty0] enabled Apr 12 18:40:54.675620 kernel: printk: console [ttyS0] enabled Apr 12 18:40:54.675627 kernel: ACPI: Core revision 20210730 Apr 12 18:40:54.675633 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Apr 12 18:40:54.675639 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:40:54.675644 kernel: x2apic enabled Apr 12 18:40:54.675650 kernel: Switched APIC routing to physical x2apic. Apr 12 18:40:54.675655 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:40:54.675661 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Apr 12 18:40:54.675667 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Apr 12 18:40:54.675673 kernel: Disabled fast string operations Apr 12 18:40:54.675680 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 18:40:54.675685 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 18:40:54.675691 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:40:54.675697 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 18:40:54.675711 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 18:40:54.675718 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 18:40:54.675724 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 18:40:54.675729 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:40:54.675735 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 18:40:54.675742 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 18:40:54.675748 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:40:54.675754 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:40:54.675759 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:40:54.675765 kernel: SRBDS: Unknown: Dependent on hypervisor status Apr 12 18:40:54.675771 kernel: GDS: Unknown: Dependent on hypervisor status Apr 12 18:40:54.675776 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:40:54.675782 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:40:54.675788 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:40:54.675795 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:40:54.675800 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Apr 12 18:40:54.675806 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:40:54.675812 kernel: pid_max: default: 131072 minimum: 1024 Apr 12 18:40:54.675818 kernel: LSM: Security Framework initializing Apr 12 18:40:54.675823 kernel: SELinux: Initializing. Apr 12 18:40:54.675829 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:40:54.675834 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:40:54.675840 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 18:40:54.675846 kernel: Performance Events: Skylake events, core PMU driver. Apr 12 18:40:54.675852 kernel: core: CPUID marked event: 'cpu cycles' unavailable Apr 12 18:40:54.675858 kernel: core: CPUID marked event: 'instructions' unavailable Apr 12 18:40:54.675863 kernel: core: CPUID marked event: 'bus cycles' unavailable Apr 12 18:40:54.675869 kernel: core: CPUID marked event: 'cache references' unavailable Apr 12 18:40:54.675874 kernel: core: CPUID marked event: 'cache misses' unavailable Apr 12 18:40:54.675880 kernel: core: CPUID marked event: 'branch instructions' unavailable Apr 12 18:40:54.675885 kernel: core: CPUID marked event: 'branch misses' unavailable Apr 12 18:40:54.675891 kernel: ... version: 1 Apr 12 18:40:54.675897 kernel: ... bit width: 48 Apr 12 18:40:54.675903 kernel: ... generic registers: 4 Apr 12 18:40:54.675908 kernel: ... value mask: 0000ffffffffffff Apr 12 18:40:54.675914 kernel: ... max period: 000000007fffffff Apr 12 18:40:54.675919 kernel: ... fixed-purpose events: 0 Apr 12 18:40:54.675925 kernel: ... event mask: 000000000000000f Apr 12 18:40:54.675930 kernel: signal: max sigframe size: 1776 Apr 12 18:40:54.675936 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:40:54.675942 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:40:54.675948 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:40:54.675954 kernel: x86: Booting SMP configuration: Apr 12 18:40:54.675959 kernel: .... node #0, CPUs: #1 Apr 12 18:40:54.675965 kernel: Disabled fast string operations Apr 12 18:40:54.675970 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Apr 12 18:40:54.675976 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Apr 12 18:40:54.675981 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:40:54.675987 kernel: smpboot: Max logical packages: 128 Apr 12 18:40:54.675992 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Apr 12 18:40:54.676000 kernel: devtmpfs: initialized Apr 12 18:40:54.676005 kernel: x86/mm: Memory block size: 128MB Apr 12 18:40:54.676011 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Apr 12 18:40:54.676017 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:40:54.676022 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Apr 12 18:40:54.676028 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:40:54.676034 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:40:54.676039 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:40:54.676045 kernel: audit: type=2000 audit(1712947253.060:1): state=initialized audit_enabled=0 res=1 Apr 12 18:40:54.676051 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:40:54.676057 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:40:54.676063 kernel: cpuidle: using governor menu Apr 12 18:40:54.676068 kernel: Simple Boot Flag at 0x36 set to 0x80 Apr 12 18:40:54.676074 kernel: ACPI: bus type PCI registered Apr 12 18:40:54.676079 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:40:54.676085 kernel: dca service started, version 1.12.1 Apr 12 18:40:54.676091 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Apr 12 18:40:54.676096 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Apr 12 18:40:54.676103 kernel: PCI: Using configuration type 1 for base access Apr 12 18:40:54.676112 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:40:54.676118 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:40:54.676123 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:40:54.676129 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:40:54.676134 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:40:54.676140 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:40:54.676146 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:40:54.676151 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:40:54.676158 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:40:54.676163 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:40:54.676169 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:40:54.676175 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Apr 12 18:40:54.676180 kernel: ACPI: Interpreter enabled Apr 12 18:40:54.676186 kernel: ACPI: PM: (supports S0 S1 S5) Apr 12 18:40:54.676192 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:40:54.676198 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:40:54.676204 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Apr 12 18:40:54.676211 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Apr 12 18:40:54.676287 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:40:54.676338 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Apr 12 18:40:54.676384 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Apr 12 18:40:54.676392 kernel: PCI host bridge to bus 0000:00 Apr 12 18:40:54.676440 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:40:54.676482 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Apr 12 18:40:54.676526 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Apr 12 18:40:54.676567 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Apr 12 18:40:54.676607 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Apr 12 18:40:54.676648 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Apr 12 18:40:54.676690 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:40:54.678215 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Apr 12 18:40:54.678267 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Apr 12 18:40:54.678327 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Apr 12 18:40:54.678382 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Apr 12 18:40:54.678433 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Apr 12 18:40:54.678486 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Apr 12 18:40:54.678534 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Apr 12 18:40:54.678593 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:40:54.678644 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:40:54.678691 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:40:54.678754 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:40:54.678810 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Apr 12 18:40:54.678858 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Apr 12 18:40:54.678905 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Apr 12 18:40:54.678956 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Apr 12 18:40:54.679006 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Apr 12 18:40:54.679053 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Apr 12 18:40:54.679104 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Apr 12 18:40:54.679151 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Apr 12 18:40:54.679198 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Apr 12 18:40:54.679244 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Apr 12 18:40:54.679292 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Apr 12 18:40:54.679338 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:40:54.679390 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Apr 12 18:40:54.679445 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.679494 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.679558 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.679618 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.679673 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.679734 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.679788 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.679835 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.679885 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.679935 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.679989 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680037 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680089 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680137 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680188 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680235 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680289 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680337 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680389 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680437 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680487 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680537 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680595 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680645 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680696 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.680908 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.680963 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681013 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681067 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681120 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681172 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681220 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681274 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681321 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681374 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681421 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681471 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681519 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681570 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681625 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681679 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681746 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681800 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681848 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.681899 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.681947 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682001 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682049 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682104 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682151 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682203 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682250 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682301 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682351 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682402 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682449 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682499 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682545 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682599 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682657 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682716 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682766 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682817 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Apr 12 18:40:54.682865 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.682918 kernel: pci_bus 0000:01: extended config space not accessible Apr 12 18:40:54.682970 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 18:40:54.683018 kernel: pci_bus 0000:02: extended config space not accessible Apr 12 18:40:54.683027 kernel: acpiphp: Slot [32] registered Apr 12 18:40:54.683033 kernel: acpiphp: Slot [33] registered Apr 12 18:40:54.683040 kernel: acpiphp: Slot [34] registered Apr 12 18:40:54.683045 kernel: acpiphp: Slot [35] registered Apr 12 18:40:54.683050 kernel: acpiphp: Slot [36] registered Apr 12 18:40:54.683056 kernel: acpiphp: Slot [37] registered Apr 12 18:40:54.683063 kernel: acpiphp: Slot [38] registered Apr 12 18:40:54.683069 kernel: acpiphp: Slot [39] registered Apr 12 18:40:54.683075 kernel: acpiphp: Slot [40] registered Apr 12 18:40:54.683080 kernel: acpiphp: Slot [41] registered Apr 12 18:40:54.683086 kernel: acpiphp: Slot [42] registered Apr 12 18:40:54.683091 kernel: acpiphp: Slot [43] registered Apr 12 18:40:54.683097 kernel: acpiphp: Slot [44] registered Apr 12 18:40:54.683103 kernel: acpiphp: Slot [45] registered Apr 12 18:40:54.683114 kernel: acpiphp: Slot [46] registered Apr 12 18:40:54.683121 kernel: acpiphp: Slot [47] registered Apr 12 18:40:54.683128 kernel: acpiphp: Slot [48] registered Apr 12 18:40:54.683134 kernel: acpiphp: Slot [49] registered Apr 12 18:40:54.683140 kernel: acpiphp: Slot [50] registered Apr 12 18:40:54.683146 kernel: acpiphp: Slot [51] registered Apr 12 18:40:54.683151 kernel: acpiphp: Slot [52] registered Apr 12 18:40:54.683157 kernel: acpiphp: Slot [53] registered Apr 12 18:40:54.683163 kernel: acpiphp: Slot [54] registered Apr 12 18:40:54.683168 kernel: acpiphp: Slot [55] registered Apr 12 18:40:54.683174 kernel: acpiphp: Slot [56] registered Apr 12 18:40:54.683180 kernel: acpiphp: Slot [57] registered Apr 12 18:40:54.683186 kernel: acpiphp: Slot [58] registered Apr 12 18:40:54.683192 kernel: acpiphp: Slot [59] registered Apr 12 18:40:54.683197 kernel: acpiphp: Slot [60] registered Apr 12 18:40:54.683203 kernel: acpiphp: Slot [61] registered Apr 12 18:40:54.683208 kernel: acpiphp: Slot [62] registered Apr 12 18:40:54.683214 kernel: acpiphp: Slot [63] registered Apr 12 18:40:54.683279 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Apr 12 18:40:54.683329 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Apr 12 18:40:54.683378 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Apr 12 18:40:54.683426 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Apr 12 18:40:54.683472 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Apr 12 18:40:54.683519 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Apr 12 18:40:54.683565 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Apr 12 18:40:54.683619 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Apr 12 18:40:54.683667 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Apr 12 18:40:54.683803 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Apr 12 18:40:54.683851 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Apr 12 18:40:54.683897 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Apr 12 18:40:54.683950 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Apr 12 18:40:54.683999 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Apr 12 18:40:54.684048 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Apr 12 18:40:54.684095 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Apr 12 18:40:54.684143 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 18:40:54.684193 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Apr 12 18:40:54.684241 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Apr 12 18:40:54.684288 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Apr 12 18:40:54.684334 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Apr 12 18:40:54.684384 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Apr 12 18:40:54.684430 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Apr 12 18:40:54.684478 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Apr 12 18:40:54.684525 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Apr 12 18:40:54.684575 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Apr 12 18:40:54.684629 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Apr 12 18:40:54.684677 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Apr 12 18:40:54.684738 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Apr 12 18:40:54.684788 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Apr 12 18:40:54.684835 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Apr 12 18:40:54.684881 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Apr 12 18:40:54.684931 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Apr 12 18:40:54.684977 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Apr 12 18:40:54.685023 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Apr 12 18:40:54.685071 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Apr 12 18:40:54.685120 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Apr 12 18:40:54.685167 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Apr 12 18:40:54.685214 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Apr 12 18:40:54.685260 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Apr 12 18:40:54.685307 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Apr 12 18:40:54.685353 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Apr 12 18:40:54.685399 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Apr 12 18:40:54.685446 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Apr 12 18:40:54.685502 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Apr 12 18:40:54.685551 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Apr 12 18:40:54.685598 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Apr 12 18:40:54.685654 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Apr 12 18:40:54.692398 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Apr 12 18:40:54.692478 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Apr 12 18:40:54.692531 kernel: pci 0000:0b:00.0: supports D1 D2 Apr 12 18:40:54.692581 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:40:54.692635 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Apr 12 18:40:54.692687 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Apr 12 18:40:54.692774 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Apr 12 18:40:54.692823 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Apr 12 18:40:54.692872 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Apr 12 18:40:54.692918 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Apr 12 18:40:54.692965 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Apr 12 18:40:54.693011 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Apr 12 18:40:54.693064 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Apr 12 18:40:54.693117 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Apr 12 18:40:54.693168 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Apr 12 18:40:54.693214 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Apr 12 18:40:54.693265 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Apr 12 18:40:54.693312 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Apr 12 18:40:54.693359 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Apr 12 18:40:54.693409 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Apr 12 18:40:54.693457 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Apr 12 18:40:54.693502 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Apr 12 18:40:54.693550 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Apr 12 18:40:54.693597 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Apr 12 18:40:54.693643 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Apr 12 18:40:54.693691 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Apr 12 18:40:54.697055 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Apr 12 18:40:54.697111 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Apr 12 18:40:54.697161 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Apr 12 18:40:54.697208 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Apr 12 18:40:54.697254 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Apr 12 18:40:54.697303 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Apr 12 18:40:54.697349 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Apr 12 18:40:54.697397 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Apr 12 18:40:54.697443 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Apr 12 18:40:54.697493 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Apr 12 18:40:54.697540 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Apr 12 18:40:54.697587 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Apr 12 18:40:54.697632 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Apr 12 18:40:54.697681 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Apr 12 18:40:54.699075 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Apr 12 18:40:54.699130 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Apr 12 18:40:54.699179 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Apr 12 18:40:54.699233 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Apr 12 18:40:54.699280 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Apr 12 18:40:54.699327 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Apr 12 18:40:54.699376 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Apr 12 18:40:54.699424 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Apr 12 18:40:54.699472 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Apr 12 18:40:54.699520 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Apr 12 18:40:54.699569 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Apr 12 18:40:54.699616 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Apr 12 18:40:54.699665 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Apr 12 18:40:54.699730 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Apr 12 18:40:54.699791 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Apr 12 18:40:54.699840 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Apr 12 18:40:54.699887 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Apr 12 18:40:54.699933 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Apr 12 18:40:54.699986 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Apr 12 18:40:54.700032 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Apr 12 18:40:54.700079 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Apr 12 18:40:54.700126 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Apr 12 18:40:54.700175 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Apr 12 18:40:54.700221 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Apr 12 18:40:54.700266 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Apr 12 18:40:54.700313 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Apr 12 18:40:54.700365 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Apr 12 18:40:54.700411 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Apr 12 18:40:54.700457 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Apr 12 18:40:54.700506 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Apr 12 18:40:54.700552 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Apr 12 18:40:54.700599 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Apr 12 18:40:54.700647 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Apr 12 18:40:54.700694 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Apr 12 18:40:54.700954 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Apr 12 18:40:54.701006 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Apr 12 18:40:54.701053 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Apr 12 18:40:54.701099 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Apr 12 18:40:54.701157 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Apr 12 18:40:54.701211 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Apr 12 18:40:54.701264 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Apr 12 18:40:54.701318 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Apr 12 18:40:54.701370 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Apr 12 18:40:54.701418 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Apr 12 18:40:54.701427 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Apr 12 18:40:54.701433 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Apr 12 18:40:54.701439 kernel: ACPI: PCI: Interrupt link LNKB disabled Apr 12 18:40:54.701445 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:40:54.701451 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Apr 12 18:40:54.701456 kernel: iommu: Default domain type: Translated Apr 12 18:40:54.701462 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:40:54.701511 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Apr 12 18:40:54.701558 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:40:54.701604 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Apr 12 18:40:54.701613 kernel: vgaarb: loaded Apr 12 18:40:54.701619 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:40:54.701625 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:40:54.701630 kernel: PTP clock support registered Apr 12 18:40:54.701636 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:40:54.701643 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:40:54.701649 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Apr 12 18:40:54.701655 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Apr 12 18:40:54.701661 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Apr 12 18:40:54.701666 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Apr 12 18:40:54.701672 kernel: clocksource: Switched to clocksource tsc-early Apr 12 18:40:54.701678 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:40:54.701684 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:40:54.701690 kernel: pnp: PnP ACPI init Apr 12 18:40:54.701761 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Apr 12 18:40:54.701813 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Apr 12 18:40:54.701856 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Apr 12 18:40:54.701903 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Apr 12 18:40:54.701949 kernel: pnp 00:06: [dma 2] Apr 12 18:40:54.701995 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Apr 12 18:40:54.702039 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Apr 12 18:40:54.702084 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Apr 12 18:40:54.702092 kernel: pnp: PnP ACPI: found 8 devices Apr 12 18:40:54.702098 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:40:54.702103 kernel: NET: Registered PF_INET protocol family Apr 12 18:40:54.702109 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:40:54.702115 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Apr 12 18:40:54.702121 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:40:54.702126 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:40:54.702134 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 18:40:54.702140 kernel: TCP: Hash tables configured (established 16384 bind 16384) Apr 12 18:40:54.702146 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:40:54.702151 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:40:54.702157 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:40:54.702163 kernel: NET: Registered PF_XDP protocol family Apr 12 18:40:54.702212 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 18:40:54.702262 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Apr 12 18:40:54.702315 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Apr 12 18:40:54.702364 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Apr 12 18:40:54.702412 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Apr 12 18:40:54.702460 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Apr 12 18:40:54.702509 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Apr 12 18:40:54.702558 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Apr 12 18:40:54.702608 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Apr 12 18:40:54.702656 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Apr 12 18:40:54.702749 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Apr 12 18:40:54.702807 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Apr 12 18:40:54.702854 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Apr 12 18:40:54.702902 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Apr 12 18:40:54.702951 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Apr 12 18:40:54.702998 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Apr 12 18:40:54.703045 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Apr 12 18:40:54.703092 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Apr 12 18:40:54.703149 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Apr 12 18:40:54.703199 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Apr 12 18:40:54.703245 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Apr 12 18:40:54.703292 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Apr 12 18:40:54.703339 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Apr 12 18:40:54.703387 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Apr 12 18:40:54.703434 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Apr 12 18:40:54.703480 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.703529 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.703574 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.703621 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.703668 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.703733 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.703791 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.703841 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.703889 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.703939 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.703985 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704032 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704079 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704126 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704172 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704219 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704265 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704314 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704360 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704407 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704453 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704499 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704546 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704593 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.704639 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.704688 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.706250 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.706319 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.706372 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.706421 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.706825 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.706879 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707212 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707269 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707319 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707367 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707414 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707461 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707508 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707554 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707601 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707649 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707695 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707764 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707815 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707870 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.707916 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.707962 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708008 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708054 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708103 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708149 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708194 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708240 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708285 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708330 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708376 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708422 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708468 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708513 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708562 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708607 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.708653 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.708699 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709032 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709083 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709136 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709183 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709229 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709279 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709325 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709370 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709417 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709464 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709510 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709558 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709604 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709650 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709696 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709761 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709810 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709865 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.709913 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Apr 12 18:40:54.709960 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Apr 12 18:40:54.710008 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 18:40:54.710055 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Apr 12 18:40:54.710102 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Apr 12 18:40:54.710150 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Apr 12 18:40:54.710197 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Apr 12 18:40:54.710247 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Apr 12 18:40:54.710295 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Apr 12 18:40:54.710343 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Apr 12 18:40:54.710389 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Apr 12 18:40:54.710436 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Apr 12 18:40:54.710484 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Apr 12 18:40:54.710531 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Apr 12 18:40:54.710579 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Apr 12 18:40:54.710626 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Apr 12 18:40:54.710673 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Apr 12 18:40:54.710727 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Apr 12 18:40:54.710775 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Apr 12 18:40:54.710821 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Apr 12 18:40:54.710876 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Apr 12 18:40:54.710923 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Apr 12 18:40:54.710969 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Apr 12 18:40:54.711017 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Apr 12 18:40:54.711063 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Apr 12 18:40:54.711109 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Apr 12 18:40:54.711154 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Apr 12 18:40:54.711202 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Apr 12 18:40:54.711248 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Apr 12 18:40:54.711297 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Apr 12 18:40:54.711342 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Apr 12 18:40:54.711388 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Apr 12 18:40:54.711434 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Apr 12 18:40:54.711480 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Apr 12 18:40:54.711526 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Apr 12 18:40:54.711576 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Apr 12 18:40:54.711623 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Apr 12 18:40:54.711669 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Apr 12 18:40:54.711736 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Apr 12 18:40:54.711811 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Apr 12 18:40:54.713308 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Apr 12 18:40:54.713365 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Apr 12 18:40:54.713417 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Apr 12 18:40:54.713688 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Apr 12 18:40:54.713765 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Apr 12 18:40:54.713816 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Apr 12 18:40:54.713890 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Apr 12 18:40:54.714161 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Apr 12 18:40:54.714219 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Apr 12 18:40:54.714290 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Apr 12 18:40:54.714613 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Apr 12 18:40:54.714667 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Apr 12 18:40:54.714814 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Apr 12 18:40:54.714890 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Apr 12 18:40:54.723080 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Apr 12 18:40:54.723153 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Apr 12 18:40:54.723205 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Apr 12 18:40:54.723256 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Apr 12 18:40:54.723308 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Apr 12 18:40:54.723356 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Apr 12 18:40:54.723404 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Apr 12 18:40:54.723452 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Apr 12 18:40:54.723498 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Apr 12 18:40:54.723547 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Apr 12 18:40:54.723594 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Apr 12 18:40:54.723641 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Apr 12 18:40:54.723687 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Apr 12 18:40:54.723752 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Apr 12 18:40:54.723800 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Apr 12 18:40:54.723847 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Apr 12 18:40:54.723893 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Apr 12 18:40:54.724236 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Apr 12 18:40:54.724290 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Apr 12 18:40:54.724339 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Apr 12 18:40:54.724671 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Apr 12 18:40:54.724748 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Apr 12 18:40:54.724803 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Apr 12 18:40:54.724852 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Apr 12 18:40:54.724900 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Apr 12 18:40:54.724954 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Apr 12 18:40:54.725007 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Apr 12 18:40:54.725055 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Apr 12 18:40:54.725102 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Apr 12 18:40:54.725149 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Apr 12 18:40:54.725198 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Apr 12 18:40:54.725245 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Apr 12 18:40:54.725295 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Apr 12 18:40:54.725343 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Apr 12 18:40:54.725390 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Apr 12 18:40:54.725436 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Apr 12 18:40:54.725484 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Apr 12 18:40:54.725530 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Apr 12 18:40:54.725578 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Apr 12 18:40:54.725624 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Apr 12 18:40:54.725673 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Apr 12 18:40:54.725753 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Apr 12 18:40:54.725802 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Apr 12 18:40:54.725849 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Apr 12 18:40:54.725899 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Apr 12 18:40:54.725946 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Apr 12 18:40:54.726002 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Apr 12 18:40:54.726049 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Apr 12 18:40:54.726097 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Apr 12 18:40:54.726148 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Apr 12 18:40:54.726196 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Apr 12 18:40:54.726245 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Apr 12 18:40:54.726293 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Apr 12 18:40:54.726340 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Apr 12 18:40:54.726387 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Apr 12 18:40:54.726433 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Apr 12 18:40:54.726481 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Apr 12 18:40:54.726527 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Apr 12 18:40:54.726574 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Apr 12 18:40:54.726620 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Apr 12 18:40:54.726670 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Apr 12 18:40:54.726737 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Apr 12 18:40:54.726786 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Apr 12 18:40:54.726829 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Apr 12 18:40:54.726870 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Apr 12 18:40:54.726911 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Apr 12 18:40:54.726952 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Apr 12 18:40:54.727001 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Apr 12 18:40:54.727047 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Apr 12 18:40:54.727088 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Apr 12 18:40:54.727136 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Apr 12 18:40:54.727180 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Apr 12 18:40:54.727223 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Apr 12 18:40:54.727266 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Apr 12 18:40:54.727309 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Apr 12 18:40:54.727354 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Apr 12 18:40:54.727396 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Apr 12 18:40:54.727438 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Apr 12 18:40:54.727480 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Apr 12 18:40:54.727523 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Apr 12 18:40:54.727566 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Apr 12 18:40:54.727616 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Apr 12 18:40:54.727659 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Apr 12 18:40:54.727754 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Apr 12 18:40:54.727809 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Apr 12 18:40:54.727853 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Apr 12 18:40:54.727895 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Apr 12 18:40:54.729183 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Apr 12 18:40:54.729454 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Apr 12 18:40:54.729509 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Apr 12 18:40:54.729560 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Apr 12 18:40:54.729605 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Apr 12 18:40:54.729679 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Apr 12 18:40:54.729967 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Apr 12 18:40:54.730330 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Apr 12 18:40:54.730387 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Apr 12 18:40:54.730441 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Apr 12 18:40:54.730799 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Apr 12 18:40:54.730859 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Apr 12 18:40:54.730906 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Apr 12 18:40:54.730954 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Apr 12 18:40:54.731004 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Apr 12 18:40:54.731056 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Apr 12 18:40:54.731105 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Apr 12 18:40:54.731149 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Apr 12 18:40:54.731193 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Apr 12 18:40:54.731241 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Apr 12 18:40:54.731285 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Apr 12 18:40:54.731331 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Apr 12 18:40:54.731378 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Apr 12 18:40:54.731423 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Apr 12 18:40:54.731474 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Apr 12 18:40:54.731518 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Apr 12 18:40:54.731566 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Apr 12 18:40:54.731613 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Apr 12 18:40:54.731661 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Apr 12 18:40:54.731714 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Apr 12 18:40:54.731764 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Apr 12 18:40:54.731808 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Apr 12 18:40:54.731856 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Apr 12 18:40:54.731900 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Apr 12 18:40:54.731946 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Apr 12 18:40:54.731994 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Apr 12 18:40:54.732047 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Apr 12 18:40:54.732092 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Apr 12 18:40:54.732148 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Apr 12 18:40:54.732195 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Apr 12 18:40:54.732241 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Apr 12 18:40:54.732288 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Apr 12 18:40:54.732332 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Apr 12 18:40:54.732379 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Apr 12 18:40:54.732424 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Apr 12 18:40:54.732472 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Apr 12 18:40:54.732517 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Apr 12 18:40:54.732567 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Apr 12 18:40:54.732611 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Apr 12 18:40:54.732659 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Apr 12 18:40:54.732711 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Apr 12 18:40:54.732766 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Apr 12 18:40:54.732814 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Apr 12 18:40:54.732858 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Apr 12 18:40:54.732908 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Apr 12 18:40:54.732951 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Apr 12 18:40:54.732994 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Apr 12 18:40:54.733041 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Apr 12 18:40:54.733086 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Apr 12 18:40:54.733152 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Apr 12 18:40:54.733199 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Apr 12 18:40:54.733247 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Apr 12 18:40:54.733292 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Apr 12 18:40:54.733339 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Apr 12 18:40:54.733384 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Apr 12 18:40:54.733434 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Apr 12 18:40:54.733479 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Apr 12 18:40:54.733530 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Apr 12 18:40:54.733574 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Apr 12 18:40:54.733628 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:40:54.733638 kernel: PCI: CLS 32 bytes, default 64 Apr 12 18:40:54.733644 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:40:54.733652 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Apr 12 18:40:54.733659 kernel: clocksource: Switched to clocksource tsc Apr 12 18:40:54.733665 kernel: Initialise system trusted keyrings Apr 12 18:40:54.733671 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Apr 12 18:40:54.733677 kernel: Key type asymmetric registered Apr 12 18:40:54.733683 kernel: Asymmetric key parser 'x509' registered Apr 12 18:40:54.733688 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:40:54.733694 kernel: io scheduler mq-deadline registered Apr 12 18:40:54.733712 kernel: io scheduler kyber registered Apr 12 18:40:54.733720 kernel: io scheduler bfq registered Apr 12 18:40:54.733774 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Apr 12 18:40:54.733824 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.733873 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Apr 12 18:40:54.733922 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.733973 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Apr 12 18:40:54.734025 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734082 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Apr 12 18:40:54.734135 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734184 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Apr 12 18:40:54.734233 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734282 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Apr 12 18:40:54.734329 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734380 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Apr 12 18:40:54.734442 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734506 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Apr 12 18:40:54.734586 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734635 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Apr 12 18:40:54.734685 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734741 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Apr 12 18:40:54.734790 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734838 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Apr 12 18:40:54.734885 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.734934 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Apr 12 18:40:54.735127 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735182 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Apr 12 18:40:54.735231 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735279 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Apr 12 18:40:54.735326 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735373 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Apr 12 18:40:54.735423 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735472 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Apr 12 18:40:54.735519 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735566 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Apr 12 18:40:54.735613 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735661 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Apr 12 18:40:54.735723 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.735798 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Apr 12 18:40:54.736007 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.736069 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Apr 12 18:40:54.736125 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.736473 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Apr 12 18:40:54.736529 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.736582 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Apr 12 18:40:54.736631 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.736679 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Apr 12 18:40:54.736812 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.736863 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Apr 12 18:40:54.736913 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.736961 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Apr 12 18:40:54.737009 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737066 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Apr 12 18:40:54.737116 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737165 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Apr 12 18:40:54.737216 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737265 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Apr 12 18:40:54.737313 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737361 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Apr 12 18:40:54.737409 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737457 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Apr 12 18:40:54.737506 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737555 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Apr 12 18:40:54.737602 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737651 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Apr 12 18:40:54.737698 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Apr 12 18:40:54.737723 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:40:54.737730 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:40:54.737736 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:40:54.737743 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Apr 12 18:40:54.737749 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:40:54.737755 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:40:54.737807 kernel: rtc_cmos 00:01: registered as rtc0 Apr 12 18:40:54.737852 kernel: rtc_cmos 00:01: setting system clock to 2024-04-12T18:40:54 UTC (1712947254) Apr 12 18:40:54.737898 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Apr 12 18:40:54.737906 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:40:54.737913 kernel: fail to initialize ptp_kvm Apr 12 18:40:54.737919 kernel: intel_pstate: CPU model not supported Apr 12 18:40:54.737925 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:40:54.737931 kernel: Segment Routing with IPv6 Apr 12 18:40:54.737937 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:40:54.737944 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:40:54.737952 kernel: Key type dns_resolver registered Apr 12 18:40:54.737958 kernel: IPI shorthand broadcast: enabled Apr 12 18:40:54.737965 kernel: sched_clock: Marking stable (913058978, 226982747)->(1203276594, -63234869) Apr 12 18:40:54.737971 kernel: registered taskstats version 1 Apr 12 18:40:54.737977 kernel: Loading compiled-in X.509 certificates Apr 12 18:40:54.737983 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:40:54.737989 kernel: Key type .fscrypt registered Apr 12 18:40:54.737996 kernel: Key type fscrypt-provisioning registered Apr 12 18:40:54.738001 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:40:54.738009 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:40:54.738015 kernel: ima: No architecture policies found Apr 12 18:40:54.738021 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:40:54.738027 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:40:54.738033 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:40:54.738039 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:40:54.738045 kernel: Run /init as init process Apr 12 18:40:54.738051 kernel: with arguments: Apr 12 18:40:54.738058 kernel: /init Apr 12 18:40:54.738070 kernel: with environment: Apr 12 18:40:54.738077 kernel: HOME=/ Apr 12 18:40:54.738083 kernel: TERM=linux Apr 12 18:40:54.738089 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:40:54.738096 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:40:54.738105 systemd[1]: Detected virtualization vmware. Apr 12 18:40:54.738112 systemd[1]: Detected architecture x86-64. Apr 12 18:40:54.738118 systemd[1]: Running in initrd. Apr 12 18:40:54.738124 systemd[1]: No hostname configured, using default hostname. Apr 12 18:40:54.738130 systemd[1]: Hostname set to . Apr 12 18:40:54.738137 systemd[1]: Initializing machine ID from random generator. Apr 12 18:40:54.738143 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:40:54.738149 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:40:54.738155 systemd[1]: Reached target cryptsetup.target. Apr 12 18:40:54.738161 systemd[1]: Reached target paths.target. Apr 12 18:40:54.738167 systemd[1]: Reached target slices.target. Apr 12 18:40:54.738173 systemd[1]: Reached target swap.target. Apr 12 18:40:54.738180 systemd[1]: Reached target timers.target. Apr 12 18:40:54.738187 systemd[1]: Listening on iscsid.socket. Apr 12 18:40:54.738195 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:40:54.738201 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:40:54.738207 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:40:54.738213 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:40:54.738219 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:40:54.738226 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:40:54.738232 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:40:54.738238 systemd[1]: Reached target sockets.target. Apr 12 18:40:54.738245 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:40:54.738251 systemd[1]: Finished network-cleanup.service. Apr 12 18:40:54.738257 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:40:54.738263 systemd[1]: Starting systemd-journald.service... Apr 12 18:40:54.738269 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:40:54.738275 systemd[1]: Starting systemd-resolved.service... Apr 12 18:40:54.738283 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:40:54.738289 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:40:54.738295 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:40:54.738301 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:40:54.738307 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:40:54.738314 kernel: audit: type=1130 audit(1712947254.684:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.738320 systemd[1]: Started systemd-resolved.service. Apr 12 18:40:54.738326 kernel: audit: type=1130 audit(1712947254.688:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.738333 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:40:54.738340 kernel: audit: type=1130 audit(1712947254.692:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.738346 systemd[1]: Reached target nss-lookup.target. Apr 12 18:40:54.738352 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:40:54.738359 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:40:54.738365 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:40:54.738371 kernel: audit: type=1130 audit(1712947254.715:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.738377 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:40:54.738385 kernel: Bridge firewalling registered Apr 12 18:40:54.738391 kernel: SCSI subsystem initialized Apr 12 18:40:54.738401 systemd-journald[216]: Journal started Apr 12 18:40:54.738435 systemd-journald[216]: Runtime Journal (/run/log/journal/c631d892a86148349d9dac62754d0917) is 4.8M, max 38.8M, 34.0M free. Apr 12 18:40:54.742064 systemd[1]: Started systemd-journald.service. Apr 12 18:40:54.742085 kernel: audit: type=1130 audit(1712947254.738:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.684639 systemd-resolved[218]: Positive Trust Anchors: Apr 12 18:40:54.684644 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:40:54.746699 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:40:54.746724 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:40:54.746733 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:40:54.684664 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:40:54.686271 systemd-resolved[218]: Defaulting to hostname 'linux'. Apr 12 18:40:54.688384 systemd-modules-load[217]: Inserted module 'overlay' Apr 12 18:40:54.721971 systemd-modules-load[217]: Inserted module 'br_netfilter' Apr 12 18:40:54.747979 systemd-modules-load[217]: Inserted module 'dm_multipath' Apr 12 18:40:54.748341 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:40:54.749548 dracut-cmdline[233]: dracut-dracut-053 Apr 12 18:40:54.749548 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 18:40:54.749548 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:40:54.756006 kernel: audit: type=1130 audit(1712947254.747:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.749676 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:40:54.756945 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:40:54.759410 kernel: audit: type=1130 audit(1712947254.755:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.779719 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:40:54.791714 kernel: iscsi: registered transport (tcp) Apr 12 18:40:54.806718 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:40:54.806749 kernel: QLogic iSCSI HBA Driver Apr 12 18:40:54.823417 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:40:54.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.824038 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:40:54.827313 kernel: audit: type=1130 audit(1712947254.821:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:54.860721 kernel: raid6: avx2x4 gen() 48355 MB/s Apr 12 18:40:54.877719 kernel: raid6: avx2x4 xor() 20487 MB/s Apr 12 18:40:54.894724 kernel: raid6: avx2x2 gen() 51827 MB/s Apr 12 18:40:54.911723 kernel: raid6: avx2x2 xor() 31740 MB/s Apr 12 18:40:54.928736 kernel: raid6: avx2x1 gen() 43737 MB/s Apr 12 18:40:54.945722 kernel: raid6: avx2x1 xor() 27454 MB/s Apr 12 18:40:54.962723 kernel: raid6: sse2x4 gen() 21055 MB/s Apr 12 18:40:54.979720 kernel: raid6: sse2x4 xor() 11906 MB/s Apr 12 18:40:54.996726 kernel: raid6: sse2x2 gen() 20709 MB/s Apr 12 18:40:55.013720 kernel: raid6: sse2x2 xor() 13188 MB/s Apr 12 18:40:55.030721 kernel: raid6: sse2x1 gen() 18133 MB/s Apr 12 18:40:55.047910 kernel: raid6: sse2x1 xor() 8856 MB/s Apr 12 18:40:55.047949 kernel: raid6: using algorithm avx2x2 gen() 51827 MB/s Apr 12 18:40:55.047962 kernel: raid6: .... xor() 31740 MB/s, rmw enabled Apr 12 18:40:55.049092 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:40:55.057720 kernel: xor: automatically using best checksumming function avx Apr 12 18:40:55.119726 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:40:55.125250 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:40:55.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:55.126000 audit: BPF prog-id=7 op=LOAD Apr 12 18:40:55.126000 audit: BPF prog-id=8 op=LOAD Apr 12 18:40:55.129308 kernel: audit: type=1130 audit(1712947255.123:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:55.128644 systemd[1]: Starting systemd-udevd.service... Apr 12 18:40:55.140266 systemd-udevd[416]: Using default interface naming scheme 'v252'. Apr 12 18:40:55.144945 systemd[1]: Started systemd-udevd.service. Apr 12 18:40:55.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:55.145536 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:40:55.153617 dracut-pre-trigger[418]: rd.md=0: removing MD RAID activation Apr 12 18:40:55.171211 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:40:55.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:55.171778 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:40:55.235086 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:40:55.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:55.306924 kernel: VMware PVSCSI driver - version 1.0.7.0-k Apr 12 18:40:55.306981 kernel: vmw_pvscsi: using 64bit dma Apr 12 18:40:55.307980 kernel: vmw_pvscsi: max_id: 16 Apr 12 18:40:55.308007 kernel: vmw_pvscsi: setting ring_pages to 8 Apr 12 18:40:55.318217 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Apr 12 18:40:55.318368 kernel: vmw_pvscsi: enabling reqCallThreshold Apr 12 18:40:55.318390 kernel: vmw_pvscsi: driver-based request coalescing enabled Apr 12 18:40:55.318402 kernel: vmw_pvscsi: using MSI-X Apr 12 18:40:55.320004 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Apr 12 18:40:55.320852 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Apr 12 18:40:55.326720 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Apr 12 18:40:55.329786 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Apr 12 18:40:55.334442 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Apr 12 18:40:55.349734 kernel: libata version 3.00 loaded. Apr 12 18:40:55.352041 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Apr 12 18:40:55.352155 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:40:55.352720 kernel: ata_piix 0000:00:07.1: version 2.13 Apr 12 18:40:55.360735 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:40:55.360783 kernel: AES CTR mode by8 optimization enabled Apr 12 18:40:55.365516 kernel: scsi host1: ata_piix Apr 12 18:40:55.365657 kernel: scsi host2: ata_piix Apr 12 18:40:55.365753 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Apr 12 18:40:55.365767 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Apr 12 18:40:55.536780 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Apr 12 18:40:55.542722 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Apr 12 18:40:55.547420 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Apr 12 18:40:55.547541 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 18:40:55.547605 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Apr 12 18:40:55.547663 kernel: sd 0:0:0:0: [sda] Cache data unavailable Apr 12 18:40:55.548171 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Apr 12 18:40:55.556274 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:40:55.556305 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 18:40:55.580211 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Apr 12 18:40:55.580368 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:40:55.591719 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (464) Apr 12 18:40:55.597224 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:40:55.598981 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:40:55.600030 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Apr 12 18:40:55.599789 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:40:55.601869 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:40:55.603921 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:40:55.604652 systemd[1]: Starting disk-uuid.service... Apr 12 18:40:55.626722 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:40:55.631721 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:40:56.638338 disk-uuid[548]: The operation has completed successfully. Apr 12 18:40:56.638717 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:40:56.703286 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:40:56.703353 systemd[1]: Finished disk-uuid.service. Apr 12 18:40:56.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:56.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:56.703963 systemd[1]: Starting verity-setup.service... Apr 12 18:40:56.715723 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:40:56.791556 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:40:56.792131 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:40:56.792830 systemd[1]: Finished verity-setup.service. Apr 12 18:40:56.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:56.861379 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:40:56.861718 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:40:56.861995 systemd[1]: Starting afterburn-network-kargs.service... Apr 12 18:40:56.862460 systemd[1]: Starting ignition-setup.service... Apr 12 18:40:56.878351 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:40:56.878406 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:40:56.878415 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:40:56.882717 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:40:56.888645 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:40:56.896246 systemd[1]: Finished ignition-setup.service. Apr 12 18:40:56.896889 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:40:56.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:56.941481 systemd[1]: Finished afterburn-network-kargs.service. Apr 12 18:40:56.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:56.942292 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:40:56.988231 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:40:56.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:56.987000 audit: BPF prog-id=9 op=LOAD Apr 12 18:40:56.989118 systemd[1]: Starting systemd-networkd.service... Apr 12 18:40:57.004641 systemd-networkd[735]: lo: Link UP Apr 12 18:40:57.004653 systemd-networkd[735]: lo: Gained carrier Apr 12 18:40:57.004932 systemd-networkd[735]: Enumeration completed Apr 12 18:40:57.005121 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Apr 12 18:40:57.008979 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Apr 12 18:40:57.009100 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Apr 12 18:40:57.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.005352 systemd[1]: Started systemd-networkd.service. Apr 12 18:40:57.005499 systemd[1]: Reached target network.target. Apr 12 18:40:57.006006 systemd[1]: Starting iscsiuio.service... Apr 12 18:40:57.007667 systemd-networkd[735]: ens192: Link UP Apr 12 18:40:57.007670 systemd-networkd[735]: ens192: Gained carrier Apr 12 18:40:57.011005 systemd[1]: Started iscsiuio.service. Apr 12 18:40:57.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.011749 systemd[1]: Starting iscsid.service... Apr 12 18:40:57.013630 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:40:57.013630 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:40:57.013630 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:40:57.013630 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:40:57.013630 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:40:57.014569 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:40:57.014738 systemd[1]: Started iscsid.service. Apr 12 18:40:57.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.016058 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:40:57.024980 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:40:57.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.025281 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:40:57.025813 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:40:57.026027 systemd[1]: Reached target remote-fs.target. Apr 12 18:40:57.027263 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:40:57.032286 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:40:57.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.038400 ignition[606]: Ignition 2.14.0 Apr 12 18:40:57.038591 ignition[606]: Stage: fetch-offline Apr 12 18:40:57.038806 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:40:57.038965 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Apr 12 18:40:57.041904 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Apr 12 18:40:57.042111 ignition[606]: parsed url from cmdline: "" Apr 12 18:40:57.042152 ignition[606]: no config URL provided Apr 12 18:40:57.042267 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:40:57.042406 ignition[606]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:40:57.042890 ignition[606]: config successfully fetched Apr 12 18:40:57.042948 ignition[606]: parsing config with SHA512: ba8364c80410c19b3f0013ed052367b5ce52e1e28eb2db40de2a4342387206a71364752d9ab03153af0dc8c5260c26fe36ff6593896066b534b2f2d23abcd65b Apr 12 18:40:57.069724 unknown[606]: fetched base config from "system" Apr 12 18:40:57.069914 unknown[606]: fetched user config from "vmware" Apr 12 18:40:57.070681 ignition[606]: fetch-offline: fetch-offline passed Apr 12 18:40:57.070740 ignition[606]: Ignition finished successfully Apr 12 18:40:57.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.071671 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:40:57.071826 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:40:57.072270 systemd[1]: Starting ignition-kargs.service... Apr 12 18:40:57.077489 ignition[754]: Ignition 2.14.0 Apr 12 18:40:57.077686 ignition[754]: Stage: kargs Apr 12 18:40:57.077865 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:40:57.078018 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Apr 12 18:40:57.079377 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Apr 12 18:40:57.080956 ignition[754]: kargs: kargs passed Apr 12 18:40:57.081099 ignition[754]: Ignition finished successfully Apr 12 18:40:57.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.081892 systemd[1]: Finished ignition-kargs.service. Apr 12 18:40:57.082431 systemd[1]: Starting ignition-disks.service... Apr 12 18:40:57.086477 ignition[760]: Ignition 2.14.0 Apr 12 18:40:57.086844 ignition[760]: Stage: disks Apr 12 18:40:57.087012 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:40:57.087164 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Apr 12 18:40:57.088817 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Apr 12 18:40:57.090976 ignition[760]: disks: disks passed Apr 12 18:40:57.091011 ignition[760]: Ignition finished successfully Apr 12 18:40:57.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.091559 systemd[1]: Finished ignition-disks.service. Apr 12 18:40:57.091708 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:40:57.091803 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:40:57.091888 systemd[1]: Reached target local-fs.target. Apr 12 18:40:57.091969 systemd[1]: Reached target sysinit.target. Apr 12 18:40:57.092047 systemd[1]: Reached target basic.target. Apr 12 18:40:57.092563 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:40:57.103493 systemd-fsck[768]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:40:57.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.105354 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:40:57.105964 systemd[1]: Mounting sysroot.mount... Apr 12 18:40:57.111866 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:40:57.111612 systemd[1]: Mounted sysroot.mount. Apr 12 18:40:57.111742 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:40:57.112686 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:40:57.113066 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:40:57.113091 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:40:57.113106 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:40:57.114477 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:40:57.115140 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:40:57.117863 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:40:57.122067 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:40:57.124280 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:40:57.126415 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:40:57.127627 systemd-resolved[218]: Detected conflict on linux IN A 139.178.70.105 Apr 12 18:40:57.127635 systemd-resolved[218]: Hostname conflict, changing published hostname from 'linux' to 'linux11'. Apr 12 18:40:57.153765 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:40:57.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.154344 systemd[1]: Starting ignition-mount.service... Apr 12 18:40:57.154797 systemd[1]: Starting sysroot-boot.service... Apr 12 18:40:57.158495 bash[819]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:40:57.163390 ignition[820]: INFO : Ignition 2.14.0 Apr 12 18:40:57.163627 ignition[820]: INFO : Stage: mount Apr 12 18:40:57.163805 ignition[820]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:40:57.163958 ignition[820]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Apr 12 18:40:57.165520 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Apr 12 18:40:57.167110 ignition[820]: INFO : mount: mount passed Apr 12 18:40:57.167223 ignition[820]: INFO : Ignition finished successfully Apr 12 18:40:57.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.167719 systemd[1]: Finished ignition-mount.service. Apr 12 18:40:57.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:57.172764 systemd[1]: Finished sysroot-boot.service. Apr 12 18:40:57.822899 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:40:57.834724 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (829) Apr 12 18:40:57.838072 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:40:57.838120 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:40:57.838133 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:40:57.842725 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:40:57.846383 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:40:57.847411 systemd[1]: Starting ignition-files.service... Apr 12 18:40:57.857161 ignition[849]: INFO : Ignition 2.14.0 Apr 12 18:40:57.857161 ignition[849]: INFO : Stage: files Apr 12 18:40:57.857535 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:40:57.857535 ignition[849]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Apr 12 18:40:57.858671 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Apr 12 18:40:57.861216 ignition[849]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:40:57.861904 ignition[849]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:40:57.861904 ignition[849]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:40:57.865766 ignition[849]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:40:57.866123 ignition[849]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:40:57.867711 unknown[849]: wrote ssh authorized keys file for user: core Apr 12 18:40:57.868008 ignition[849]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:40:57.868255 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:40:57.868493 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:40:57.904504 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:40:57.958535 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:40:57.958900 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:40:57.959195 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:40:58.349859 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:40:58.479338 ignition[849]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:40:58.479694 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:40:58.479936 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:40:58.480176 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:40:58.881971 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:40:58.947488 ignition[849]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:40:58.947851 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:40:58.948535 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:40:58.948757 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:40:58.969942 systemd-networkd[735]: ens192: Gained IPv6LL Apr 12 18:40:59.170822 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:40:59.389738 ignition[849]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 18:40:59.390089 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:40:59.390089 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:40:59.390089 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:40:59.444748 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:40:59.795309 ignition[849]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 18:40:59.795669 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:40:59.796021 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:40:59.796225 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:40:59.850599 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:41:00.008138 ignition[849]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: a2de71807eb4c41f4d70e5c47fac72ecf3c74984be6c08be0597fc58621baeeddc1b5cc6431ab007eee9bd0a98f8628dd21512b06daaeccfac5837e9792a98a7 Apr 12 18:41:00.008138 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:41:00.008772 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:41:00.014204 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:41:00.014389 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:41:00.017745 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Apr 12 18:41:00.017938 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:41:00.043397 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2659306763" Apr 12 18:41:00.043682 ignition[849]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2659306763": device or resource busy Apr 12 18:41:00.043932 ignition[849]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2659306763", trying btrfs: device or resource busy Apr 12 18:41:00.044173 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2659306763" Apr 12 18:41:00.045808 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2659306763" Apr 12 18:41:00.046714 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (854) Apr 12 18:41:00.055779 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2659306763" Apr 12 18:41:00.056011 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2659306763" Apr 12 18:41:00.056212 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Apr 12 18:41:00.056907 systemd[1]: mnt-oem2659306763.mount: Deactivated successfully. Apr 12 18:41:00.060626 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Apr 12 18:41:00.060941 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Apr 12 18:41:00.061161 ignition[849]: INFO : files: op(14): [started] processing unit "vmtoolsd.service" Apr 12 18:41:00.061317 ignition[849]: INFO : files: op(14): [finished] processing unit "vmtoolsd.service" Apr 12 18:41:00.061469 ignition[849]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Apr 12 18:41:00.061643 ignition[849]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:41:00.061907 ignition[849]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:41:00.062114 ignition[849]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Apr 12 18:41:00.062268 ignition[849]: INFO : files: op(17): [started] processing unit "prepare-helm.service" Apr 12 18:41:00.062438 ignition[849]: INFO : files: op(17): op(18): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:41:00.062682 ignition[849]: INFO : files: op(17): op(18): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:41:00.062878 ignition[849]: INFO : files: op(17): [finished] processing unit "prepare-helm.service" Apr 12 18:41:00.063035 ignition[849]: INFO : files: op(19): [started] processing unit "coreos-metadata.service" Apr 12 18:41:00.063213 ignition[849]: INFO : files: op(19): op(1a): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:41:00.063466 ignition[849]: INFO : files: op(19): op(1a): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:41:00.063661 ignition[849]: INFO : files: op(19): [finished] processing unit "coreos-metadata.service" Apr 12 18:41:00.063829 ignition[849]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:41:00.064004 ignition[849]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:41:00.064263 ignition[849]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:41:00.064469 ignition[849]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:41:00.064628 ignition[849]: INFO : files: op(1d): [started] setting preset to enabled for "vmtoolsd.service" Apr 12 18:41:00.064841 ignition[849]: INFO : files: op(1d): [finished] setting preset to enabled for "vmtoolsd.service" Apr 12 18:41:00.065001 ignition[849]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:41:00.065181 ignition[849]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:41:00.065345 ignition[849]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:41:00.065522 ignition[849]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:41:00.065682 ignition[849]: INFO : files: op(20): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:41:00.065848 ignition[849]: INFO : files: op(20): op(21): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:41:01.052516 ignition[849]: INFO : files: op(20): op(21): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:41:01.052874 ignition[849]: INFO : files: op(20): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:41:01.052874 ignition[849]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:41:01.052874 ignition[849]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:41:01.052874 ignition[849]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:41:01.052874 ignition[849]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:41:01.052874 ignition[849]: INFO : files: files passed Apr 12 18:41:01.052874 ignition[849]: INFO : Ignition finished successfully Apr 12 18:41:01.055285 systemd[1]: Finished ignition-files.service. Apr 12 18:41:01.057810 kernel: kauditd_printk_skb: 24 callbacks suppressed Apr 12 18:41:01.057835 kernel: audit: type=1130 audit(1712947261.053:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.056050 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:41:01.059030 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:41:01.059451 systemd[1]: Starting ignition-quench.service... Apr 12 18:41:01.075064 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:41:01.075759 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:41:01.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.076064 systemd[1]: Reached target ignition-complete.target. Apr 12 18:41:01.078761 kernel: audit: type=1130 audit(1712947261.074:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.079161 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:41:01.080951 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:41:01.081140 systemd[1]: Finished ignition-quench.service. Apr 12 18:41:01.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.086198 kernel: audit: type=1130 audit(1712947261.079:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.086222 kernel: audit: type=1131 audit(1712947261.079:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.091791 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:41:01.091841 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:41:01.092263 systemd[1]: Reached target initrd-fs.target. Apr 12 18:41:01.092468 systemd[1]: Reached target initrd.target. Apr 12 18:41:01.092690 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:41:01.093352 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:41:01.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.098860 kernel: audit: type=1130 audit(1712947261.090:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.098895 kernel: audit: type=1131 audit(1712947261.090:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.100019 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:41:01.100623 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:41:01.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.103724 kernel: audit: type=1130 audit(1712947261.098:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.106662 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:41:01.106835 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:41:01.107030 systemd[1]: Stopped target timers.target. Apr 12 18:41:01.107203 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:41:01.107267 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:41:01.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.107546 systemd[1]: Stopped target initrd.target. Apr 12 18:41:01.110193 systemd[1]: Stopped target basic.target. Apr 12 18:41:01.110469 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:41:01.110783 kernel: audit: type=1131 audit(1712947261.105:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.110900 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:41:01.111180 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:41:01.111462 systemd[1]: Stopped target remote-fs.target. Apr 12 18:41:01.111740 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:41:01.112020 systemd[1]: Stopped target sysinit.target. Apr 12 18:41:01.112293 systemd[1]: Stopped target local-fs.target. Apr 12 18:41:01.112560 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:41:01.112864 systemd[1]: Stopped target swap.target. Apr 12 18:41:01.113104 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:41:01.113329 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:41:01.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.113710 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:41:01.116159 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:41:01.116365 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:41:01.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.116766 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:41:01.119082 kernel: audit: type=1131 audit(1712947261.111:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.119097 kernel: audit: type=1131 audit(1712947261.114:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.116867 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:41:01.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.119469 systemd[1]: Stopped target paths.target. Apr 12 18:41:01.119728 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:41:01.122726 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:41:01.122928 systemd[1]: Stopped target slices.target. Apr 12 18:41:01.123094 systemd[1]: Stopped target sockets.target. Apr 12 18:41:01.123252 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:41:01.123311 systemd[1]: Closed iscsid.socket. Apr 12 18:41:01.123551 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:41:01.123637 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:41:01.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.123869 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:41:01.123948 systemd[1]: Stopped ignition-files.service. Apr 12 18:41:01.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.124698 systemd[1]: Stopping ignition-mount.service... Apr 12 18:41:01.125298 systemd[1]: Stopping iscsiuio.service... Apr 12 18:41:01.125378 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:41:01.125459 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:41:01.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.128808 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:41:01.128938 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:41:01.129039 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:41:01.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.129343 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:41:01.129419 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:41:01.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.130954 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:41:01.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.133288 ignition[888]: INFO : Ignition 2.14.0 Apr 12 18:41:01.133288 ignition[888]: INFO : Stage: umount Apr 12 18:41:01.133288 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:41:01.133288 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Apr 12 18:41:01.133288 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Apr 12 18:41:01.131026 systemd[1]: Stopped iscsiuio.service. Apr 12 18:41:01.131788 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:41:01.131840 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:41:01.132396 systemd[1]: Stopped target network.target. Apr 12 18:41:01.132493 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:41:01.132510 systemd[1]: Closed iscsiuio.socket. Apr 12 18:41:01.132835 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:41:01.132980 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:41:01.137036 ignition[888]: INFO : umount: umount passed Apr 12 18:41:01.137036 ignition[888]: INFO : Ignition finished successfully Apr 12 18:41:01.137714 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:41:01.137784 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:41:01.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.138549 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:41:01.138595 systemd[1]: Stopped ignition-mount.service. Apr 12 18:41:01.138837 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:41:01.138854 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:41:01.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.139036 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:41:01.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.139057 systemd[1]: Stopped ignition-disks.service. Apr 12 18:41:01.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.139203 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:41:01.139223 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:41:01.139375 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:41:01.139393 systemd[1]: Stopped ignition-setup.service. Apr 12 18:41:01.139913 systemd[1]: Stopping network-cleanup.service... Apr 12 18:41:01.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.139000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:41:01.140005 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:41:01.140030 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:41:01.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.140160 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Apr 12 18:41:01.140179 systemd[1]: Stopped afterburn-network-kargs.service. Apr 12 18:41:01.140290 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:41:01.140311 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:41:01.141271 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:41:01.141294 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:41:01.142959 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:41:01.143839 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:41:01.144094 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:41:01.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.144137 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:41:01.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.146360 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:41:01.146406 systemd[1]: Stopped network-cleanup.service. Apr 12 18:41:01.145000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:41:01.147028 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:41:01.147093 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:41:01.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.147241 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:41:01.147259 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:41:01.147357 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:41:01.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.147373 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:41:01.147459 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:41:01.147479 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:41:01.147576 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:41:01.147595 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:41:01.147690 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:41:01.147736 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:41:01.148377 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:41:01.148471 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:41:01.148496 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:41:01.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.151991 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:41:01.152205 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:41:01.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.204597 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:41:01.232520 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:41:01.232842 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:41:01.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.233283 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:41:01.233576 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:41:01.233789 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:41:01.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.234651 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:41:01.243765 systemd[1]: Switching root. Apr 12 18:41:01.259992 systemd-journald[216]: Journal stopped Apr 12 18:41:04.507747 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Apr 12 18:41:04.507766 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:41:04.507775 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:41:04.507780 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:41:04.507786 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:41:04.507793 kernel: SELinux: policy capability open_perms=1 Apr 12 18:41:04.507799 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:41:04.507805 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:41:04.507811 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:41:04.507816 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:41:04.507822 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:41:04.507827 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:41:04.507834 systemd[1]: Successfully loaded SELinux policy in 42.593ms. Apr 12 18:41:04.507841 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.804ms. Apr 12 18:41:04.507849 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:41:04.507856 systemd[1]: Detected virtualization vmware. Apr 12 18:41:04.507863 systemd[1]: Detected architecture x86-64. Apr 12 18:41:04.507869 systemd[1]: Detected first boot. Apr 12 18:41:04.507876 systemd[1]: Initializing machine ID from random generator. Apr 12 18:41:04.507882 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:41:04.507888 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:41:04.507895 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:41:04.507902 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:41:04.507909 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:41:04.507917 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:41:04.507924 systemd[1]: Stopped iscsid.service. Apr 12 18:41:04.507931 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:41:04.507937 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:41:04.507943 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:41:04.507951 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:41:04.507963 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:41:04.507975 systemd[1]: Created slice system-getty.slice. Apr 12 18:41:04.507986 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:41:04.507997 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:41:04.508004 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:41:04.508011 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:41:04.508018 systemd[1]: Created slice user.slice. Apr 12 18:41:04.508024 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:41:04.508030 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:41:04.508038 systemd[1]: Set up automount boot.automount. Apr 12 18:41:04.508045 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:41:04.508053 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:41:04.508060 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:41:04.508066 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:41:04.508073 systemd[1]: Reached target integritysetup.target. Apr 12 18:41:04.508080 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:41:04.508086 systemd[1]: Reached target remote-fs.target. Apr 12 18:41:04.508093 systemd[1]: Reached target slices.target. Apr 12 18:41:04.508100 systemd[1]: Reached target swap.target. Apr 12 18:41:04.508107 systemd[1]: Reached target torcx.target. Apr 12 18:41:04.508114 systemd[1]: Reached target veritysetup.target. Apr 12 18:41:04.508121 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:41:04.508127 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:41:04.508134 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:41:04.508142 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:41:04.508149 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:41:04.508156 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:41:04.508162 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:41:04.508169 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:41:04.508176 systemd[1]: Mounting media.mount... Apr 12 18:41:04.508182 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:41:04.508190 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:41:04.508197 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:41:04.508204 systemd[1]: Mounting tmp.mount... Apr 12 18:41:04.508211 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:41:04.508217 systemd[1]: Starting ignition-delete-config.service... Apr 12 18:41:04.508225 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:41:04.508231 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:41:04.508238 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:41:04.508245 systemd[1]: Starting modprobe@drm.service... Apr 12 18:41:04.508253 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:41:04.508260 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:41:04.508266 systemd[1]: Starting modprobe@loop.service... Apr 12 18:41:04.508273 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:41:04.508280 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:41:04.508287 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:41:04.508294 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:41:04.508300 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:41:04.508307 systemd[1]: Stopped systemd-journald.service. Apr 12 18:41:04.508315 systemd[1]: Starting systemd-journald.service... Apr 12 18:41:04.508323 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:41:04.508335 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:41:04.508346 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:41:04.508357 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:41:04.508365 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:41:04.508372 systemd[1]: Stopped verity-setup.service. Apr 12 18:41:04.508379 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:41:04.508386 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:41:04.508394 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:41:04.508400 systemd[1]: Mounted media.mount. Apr 12 18:41:04.508407 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:41:04.508414 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:41:04.508421 systemd[1]: Mounted tmp.mount. Apr 12 18:41:04.508428 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:41:04.508435 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:41:04.508441 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:41:04.508448 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:41:04.508456 systemd[1]: Finished modprobe@drm.service. Apr 12 18:41:04.508463 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:41:04.508470 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:41:04.508477 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:41:04.508483 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:41:04.508490 systemd[1]: Reached target network-pre.target. Apr 12 18:41:04.508499 systemd-journald[1001]: Journal started Apr 12 18:41:04.508529 systemd-journald[1001]: Runtime Journal (/run/log/journal/88c8e2eda663456984e614cdcdc46fe1) is 4.8M, max 38.8M, 34.0M free. Apr 12 18:41:04.508554 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:41:01.546000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:41:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:41:01.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:41:01.679000 audit: BPF prog-id=10 op=LOAD Apr 12 18:41:01.679000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:41:01.679000 audit: BPF prog-id=11 op=LOAD Apr 12 18:41:01.679000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:41:01.898000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:41:01.898000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:01.898000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:41:01.900000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:41:01.900000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:01.900000 audit: CWD cwd="/" Apr 12 18:41:01.900000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:01.900000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:01.900000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:41:04.375000 audit: BPF prog-id=12 op=LOAD Apr 12 18:41:04.375000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:41:04.375000 audit: BPF prog-id=13 op=LOAD Apr 12 18:41:04.375000 audit: BPF prog-id=14 op=LOAD Apr 12 18:41:04.375000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:41:04.375000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:41:04.377000 audit: BPF prog-id=15 op=LOAD Apr 12 18:41:04.377000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:41:04.377000 audit: BPF prog-id=16 op=LOAD Apr 12 18:41:04.377000 audit: BPF prog-id=17 op=LOAD Apr 12 18:41:04.377000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:41:04.377000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:41:04.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.381000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:41:04.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.458000 audit: BPF prog-id=18 op=LOAD Apr 12 18:41:04.458000 audit: BPF prog-id=19 op=LOAD Apr 12 18:41:04.458000 audit: BPF prog-id=20 op=LOAD Apr 12 18:41:04.458000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:41:04.458000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:41:04.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.504000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:41:04.504000 audit[1001]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcd07bcf50 a2=4000 a3=7ffcd07bcfec items=0 ppid=1 pid=1001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.504000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:41:04.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.376019 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:41:01.891047 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:41:04.380109 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:41:01.893220 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:41:01.893239 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:41:01.893267 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:41:01.893277 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:41:01.893355 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:41:01.893368 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:41:01.893538 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:41:04.510613 jq[988]: true Apr 12 18:41:01.893571 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:41:01.893583 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:41:04.516170 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:41:04.516197 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:41:01.898878 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:41:01.898912 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:41:01.898931 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:41:01.898945 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:41:01.898962 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:41:01.898974 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:41:03.922151 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:03.922337 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:03.922399 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:03.922499 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:03.922531 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:41:03.922573 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2024-04-12T18:41:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:41:04.519356 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:41:04.519377 systemd[1]: Started systemd-journald.service. Apr 12 18:41:04.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.520065 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:41:04.521182 jq[1010]: true Apr 12 18:41:04.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.521331 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:41:04.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.526665 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:41:04.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.540863 systemd-journald[1001]: Time spent on flushing to /var/log/journal/88c8e2eda663456984e614cdcdc46fe1 is 64.508ms for 2026 entries. Apr 12 18:41:04.540863 systemd-journald[1001]: System Journal (/var/log/journal/88c8e2eda663456984e614cdcdc46fe1) is 8.0M, max 584.8M, 576.8M free. Apr 12 18:41:04.634384 kernel: fuse: init (API version 7.34) Apr 12 18:41:04.634427 systemd-journald[1001]: Received client request to flush runtime journal. Apr 12 18:41:04.634466 kernel: loop: module loaded Apr 12 18:41:04.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.527929 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:41:04.529262 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:41:04.531562 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:41:04.532640 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:41:04.533063 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:41:04.533264 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:41:04.542658 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:41:04.542759 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:41:04.543903 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:41:04.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.546096 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:41:04.554775 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:41:04.573007 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:41:04.573100 systemd[1]: Finished modprobe@loop.service. Apr 12 18:41:04.573333 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:41:04.601264 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:41:04.602286 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:41:04.636621 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:41:04.662592 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:41:04.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.663652 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:41:04.671152 udevadm[1056]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:41:04.689996 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:41:04.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:04.911945 ignition[1018]: Ignition 2.14.0 Apr 12 18:41:04.912721 ignition[1018]: deleting config from guestinfo properties Apr 12 18:41:04.922753 ignition[1018]: Successfully deleted config Apr 12 18:41:04.923559 systemd[1]: Finished ignition-delete-config.service. Apr 12 18:41:04.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.121759 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:41:05.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.120000 audit: BPF prog-id=21 op=LOAD Apr 12 18:41:05.120000 audit: BPF prog-id=22 op=LOAD Apr 12 18:41:05.120000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:41:05.120000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:41:05.123140 systemd[1]: Starting systemd-udevd.service... Apr 12 18:41:05.135319 systemd-udevd[1057]: Using default interface naming scheme 'v252'. Apr 12 18:41:05.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.194000 audit: BPF prog-id=23 op=LOAD Apr 12 18:41:05.195462 systemd[1]: Started systemd-udevd.service. Apr 12 18:41:05.197830 systemd[1]: Starting systemd-networkd.service... Apr 12 18:41:05.216463 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:41:05.252719 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:41:05.257729 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:41:05.277000 audit: BPF prog-id=24 op=LOAD Apr 12 18:41:05.277000 audit: BPF prog-id=25 op=LOAD Apr 12 18:41:05.277000 audit: BPF prog-id=26 op=LOAD Apr 12 18:41:05.279318 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:41:05.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.306578 systemd[1]: Started systemd-userdbd.service. Apr 12 18:41:05.312712 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Apr 12 18:41:05.314813 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Apr 12 18:41:05.316717 kernel: Guest personality initialized and is active Apr 12 18:41:05.324726 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Apr 12 18:41:05.324791 kernel: Initialized host personality Apr 12 18:41:05.303000 audit[1068]: AVC avc: denied { confidentiality } for pid=1068 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:41:05.303000 audit[1068]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56348f024540 a1=32194 a2=7f98189c4bc5 a3=5 items=108 ppid=1057 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:05.303000 audit: CWD cwd="/" Apr 12 18:41:05.303000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=1 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=2 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=3 name=(null) inode=24958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=4 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=5 name=(null) inode=24959 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=6 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=7 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=8 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=9 name=(null) inode=24961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=10 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=11 name=(null) inode=24962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=12 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=13 name=(null) inode=24963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=14 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=15 name=(null) inode=24964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=16 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=17 name=(null) inode=24965 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=18 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=19 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=20 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=21 name=(null) inode=24967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=22 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=23 name=(null) inode=24968 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=24 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=25 name=(null) inode=24969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=26 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=27 name=(null) inode=24970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=28 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=29 name=(null) inode=24971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=30 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=31 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=32 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=33 name=(null) inode=24973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=34 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=35 name=(null) inode=24974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=36 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=37 name=(null) inode=24975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=38 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=39 name=(null) inode=24976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=40 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=41 name=(null) inode=24977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=42 name=(null) inode=24957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=43 name=(null) inode=24978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=44 name=(null) inode=24978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=45 name=(null) inode=24979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=46 name=(null) inode=24978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=47 name=(null) inode=24980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=48 name=(null) inode=24978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=49 name=(null) inode=24981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=50 name=(null) inode=24978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=51 name=(null) inode=24982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=52 name=(null) inode=24978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=53 name=(null) inode=24983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=55 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=56 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=57 name=(null) inode=24985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=58 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=59 name=(null) inode=24986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=60 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=61 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=62 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=63 name=(null) inode=24988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=64 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=65 name=(null) inode=24989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=66 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=67 name=(null) inode=24990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=68 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=69 name=(null) inode=24991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=70 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=71 name=(null) inode=24992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=72 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=73 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=74 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=75 name=(null) inode=24994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=76 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=77 name=(null) inode=24995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=78 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=79 name=(null) inode=24996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=80 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=81 name=(null) inode=24997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=82 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=83 name=(null) inode=24998 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=84 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=85 name=(null) inode=24999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=86 name=(null) inode=24999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=87 name=(null) inode=25000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=88 name=(null) inode=24999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=89 name=(null) inode=25001 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=90 name=(null) inode=24999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=91 name=(null) inode=25002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=92 name=(null) inode=24999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=93 name=(null) inode=25003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=94 name=(null) inode=24999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=95 name=(null) inode=25004 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=96 name=(null) inode=24984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=97 name=(null) inode=25005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=98 name=(null) inode=25005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=99 name=(null) inode=25006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=100 name=(null) inode=25005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=101 name=(null) inode=25007 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=102 name=(null) inode=25005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=103 name=(null) inode=25008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=104 name=(null) inode=25005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=105 name=(null) inode=25009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=106 name=(null) inode=25005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PATH item=107 name=(null) inode=25010 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:05.303000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:41:05.354872 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Apr 12 18:41:05.369810 systemd-networkd[1067]: lo: Link UP Apr 12 18:41:05.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.369816 systemd-networkd[1067]: lo: Gained carrier Apr 12 18:41:05.370113 systemd-networkd[1067]: Enumeration completed Apr 12 18:41:05.370189 systemd-networkd[1067]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Apr 12 18:41:05.370331 systemd[1]: Started systemd-networkd.service. Apr 12 18:41:05.372718 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Apr 12 18:41:05.373851 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Apr 12 18:41:05.374010 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Apr 12 18:41:05.375271 systemd-networkd[1067]: ens192: Link UP Apr 12 18:41:05.375352 systemd-networkd[1067]: ens192: Gained carrier Apr 12 18:41:05.382604 (udev-worker)[1070]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Apr 12 18:41:05.397736 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1063) Apr 12 18:41:05.408407 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:41:05.421718 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:41:05.429724 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:41:05.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.443178 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:41:05.444620 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:41:05.466036 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:41:05.490456 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:41:05.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.490645 systemd[1]: Reached target cryptsetup.target. Apr 12 18:41:05.491641 systemd[1]: Starting lvm2-activation.service... Apr 12 18:41:05.495565 lvm[1091]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:41:05.522494 systemd[1]: Finished lvm2-activation.service. Apr 12 18:41:05.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.522686 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:41:05.522794 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:41:05.522809 systemd[1]: Reached target local-fs.target. Apr 12 18:41:05.522900 systemd[1]: Reached target machines.target. Apr 12 18:41:05.523948 systemd[1]: Starting ldconfig.service... Apr 12 18:41:05.524640 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:41:05.524677 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:41:05.525582 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:41:05.526602 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:41:05.528286 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:41:05.528496 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:41:05.528529 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:41:05.529811 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:41:05.540442 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1093 (bootctl) Apr 12 18:41:05.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:05.541480 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:41:05.545341 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:41:05.663047 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:41:05.775197 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:41:05.880691 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:41:06.767473 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) Apr 12 18:41:06.767473 systemd-fsck[1101]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 18:41:06.768283 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:41:06.770825 kernel: kauditd_printk_skb: 229 callbacks suppressed Apr 12 18:41:06.770870 kernel: audit: type=1130 audit(1712947266.766:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:06.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:06.769309 systemd[1]: Mounting boot.mount... Apr 12 18:41:06.932009 systemd[1]: Mounted boot.mount. Apr 12 18:41:06.941228 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:41:06.941596 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:41:06.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:06.944799 kernel: audit: type=1130 audit(1712947266.940:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:06.983828 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:41:06.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:06.986728 kernel: audit: type=1130 audit(1712947266.982:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.034007 systemd-networkd[1067]: ens192: Gained IPv6LL Apr 12 18:41:07.227828 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:41:07.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.228874 systemd[1]: Starting audit-rules.service... Apr 12 18:41:07.230854 kernel: audit: type=1130 audit(1712947267.226:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.231638 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:41:07.232559 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:41:07.231000 audit: BPF prog-id=27 op=LOAD Apr 12 18:41:07.236485 kernel: audit: type=1334 audit(1712947267.231:158): prog-id=27 op=LOAD Apr 12 18:41:07.236542 kernel: audit: type=1334 audit(1712947267.233:159): prog-id=28 op=LOAD Apr 12 18:41:07.233000 audit: BPF prog-id=28 op=LOAD Apr 12 18:41:07.234800 systemd[1]: Starting systemd-resolved.service... Apr 12 18:41:07.236098 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:41:07.237692 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:41:07.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.242425 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:41:07.242681 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:41:07.245725 kernel: audit: type=1130 audit(1712947267.240:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.244000 audit[1109]: SYSTEM_BOOT pid=1109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.250087 kernel: audit: type=1127 audit(1712947267.244:161): pid=1109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.250332 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:41:07.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.253833 kernel: audit: type=1130 audit(1712947267.248:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.272627 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:41:07.275714 kernel: audit: type=1130 audit(1712947267.271:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:07.293091 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:41:07.293253 systemd[1]: Reached target time-set.target. Apr 12 18:41:07.299000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:41:07.299000 audit[1125]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdd73c3590 a2=420 a3=0 items=0 ppid=1104 pid=1125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:07.299000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:41:07.301241 systemd[1]: Finished audit-rules.service. Apr 12 18:41:07.301561 augenrules[1125]: No rules Apr 12 18:41:07.304585 systemd-resolved[1107]: Positive Trust Anchors: Apr 12 18:41:07.304598 systemd-resolved[1107]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:41:07.304617 systemd-resolved[1107]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:41:07.327861 systemd-resolved[1107]: Defaulting to hostname 'linux'. Apr 12 18:41:07.329140 systemd[1]: Started systemd-resolved.service. Apr 12 18:41:07.329285 systemd[1]: Reached target network.target. Apr 12 18:41:07.329367 systemd[1]: Reached target nss-lookup.target. Apr 12 18:41:07.451951 ldconfig[1092]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:41:07.482995 systemd[1]: Finished ldconfig.service. Apr 12 18:41:07.484275 systemd[1]: Starting systemd-update-done.service... Apr 12 18:41:07.494263 systemd[1]: Finished systemd-update-done.service. Apr 12 18:41:07.494475 systemd[1]: Reached target sysinit.target. Apr 12 18:41:07.494653 systemd[1]: Started motdgen.path. Apr 12 18:41:07.494796 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:41:07.495030 systemd[1]: Started logrotate.timer. Apr 12 18:41:07.495198 systemd[1]: Started mdadm.timer. Apr 12 18:41:07.495306 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:41:07.495427 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:41:07.495450 systemd[1]: Reached target paths.target. Apr 12 18:41:07.495557 systemd[1]: Reached target timers.target. Apr 12 18:41:07.495862 systemd[1]: Listening on dbus.socket. Apr 12 18:41:07.496816 systemd[1]: Starting docker.socket... Apr 12 18:41:07.512316 systemd[1]: Listening on sshd.socket. Apr 12 18:41:07.512520 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:41:07.512861 systemd[1]: Listening on docker.socket. Apr 12 18:41:07.513030 systemd[1]: Reached target sockets.target. Apr 12 18:41:07.513158 systemd[1]: Reached target basic.target. Apr 12 18:41:07.513307 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:41:07.513335 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:41:07.514170 systemd[1]: Starting containerd.service... Apr 12 18:41:07.515170 systemd[1]: Starting dbus.service... Apr 12 18:41:07.516562 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:41:07.517504 systemd[1]: Starting extend-filesystems.service... Apr 12 18:41:07.518995 jq[1135]: false Apr 12 18:41:07.518130 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:41:07.519019 systemd[1]: Starting motdgen.service... Apr 12 18:41:07.520548 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:41:07.523186 systemd[1]: Starting prepare-critools.service... Apr 12 18:41:07.524078 systemd[1]: Starting prepare-helm.service... Apr 12 18:41:07.525079 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:41:07.526034 systemd[1]: Starting sshd-keygen.service... Apr 12 18:41:07.528218 systemd[1]: Starting systemd-logind.service... Apr 12 18:41:07.528545 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:41:07.528589 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:41:07.528972 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:41:07.539537 jq[1146]: true Apr 12 18:41:07.530280 systemd[1]: Starting update-engine.service... Apr 12 18:41:07.531535 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:41:07.532627 systemd[1]: Starting vmtoolsd.service... Apr 12 18:41:07.534291 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:41:07.534405 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:41:07.540536 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:41:07.540633 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:41:07.545086 jq[1157]: true Apr 12 18:41:07.552086 systemd[1]: Started vmtoolsd.service. Apr 12 18:41:56.029826 systemd-timesyncd[1108]: Contacted time server 168.235.89.132:123 (0.flatcar.pool.ntp.org). Apr 12 18:41:56.029895 systemd-timesyncd[1108]: Initial clock synchronization to Fri 2024-04-12 18:41:56.029688 UTC. Apr 12 18:41:56.036705 tar[1152]: crictl Apr 12 18:41:56.039553 tar[1151]: ./ Apr 12 18:41:56.039553 tar[1151]: ./loopback Apr 12 18:41:56.042206 systemd-resolved[1107]: Clock change detected. Flushing caches. Apr 12 18:41:56.042366 tar[1153]: linux-amd64/helm Apr 12 18:41:56.045225 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:41:56.045321 systemd[1]: Finished motdgen.service. Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda1 Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda2 Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda3 Apr 12 18:41:56.053606 extend-filesystems[1136]: Found usr Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda4 Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda6 Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda7 Apr 12 18:41:56.053606 extend-filesystems[1136]: Found sda9 Apr 12 18:41:56.053606 extend-filesystems[1136]: Checking size of /dev/sda9 Apr 12 18:41:56.077103 tar[1151]: ./bandwidth Apr 12 18:41:56.105722 tar[1151]: ./ptp Apr 12 18:41:56.114357 extend-filesystems[1136]: Old size kept for /dev/sda9 Apr 12 18:41:56.114357 extend-filesystems[1136]: Found sr0 Apr 12 18:41:56.114807 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:41:56.114900 systemd[1]: Finished extend-filesystems.service. Apr 12 18:41:56.120388 env[1160]: time="2024-04-12T18:41:56.120308949Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:41:56.122524 bash[1189]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:41:56.120969 systemd[1]: Started dbus.service. Apr 12 18:41:56.120879 dbus-daemon[1134]: [system] SELinux support is enabled Apr 12 18:41:56.122164 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:41:56.122177 systemd[1]: Reached target system-config.target. Apr 12 18:41:56.122287 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:41:56.122297 systemd[1]: Reached target user-config.target. Apr 12 18:41:56.123171 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:41:56.134189 systemd-logind[1143]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:41:56.134414 systemd-logind[1143]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:41:56.134636 systemd-logind[1143]: New seat seat0. Apr 12 18:41:56.135406 systemd[1]: Started systemd-logind.service. Apr 12 18:41:56.148586 kernel: NET: Registered PF_VSOCK protocol family Apr 12 18:41:56.164065 update_engine[1144]: I0412 18:41:56.162577 1144 main.cc:92] Flatcar Update Engine starting Apr 12 18:41:56.166150 systemd[1]: Started update-engine.service. Apr 12 18:41:56.167659 systemd[1]: Started locksmithd.service. Apr 12 18:41:56.168297 update_engine[1144]: I0412 18:41:56.168231 1144 update_check_scheduler.cc:74] Next update check in 11m24s Apr 12 18:41:56.191212 env[1160]: time="2024-04-12T18:41:56.191187835Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:41:56.202764 env[1160]: time="2024-04-12T18:41:56.202740319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:56.208070 env[1160]: time="2024-04-12T18:41:56.208044753Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:41:56.208512 env[1160]: time="2024-04-12T18:41:56.208501325Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:56.208708 env[1160]: time="2024-04-12T18:41:56.208695870Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:41:56.209390 env[1160]: time="2024-04-12T18:41:56.209378604Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:56.209459 env[1160]: time="2024-04-12T18:41:56.209447921Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:41:56.209502 env[1160]: time="2024-04-12T18:41:56.209492553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:56.209642 env[1160]: time="2024-04-12T18:41:56.209632876Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:56.209818 env[1160]: time="2024-04-12T18:41:56.209808386Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:56.209940 env[1160]: time="2024-04-12T18:41:56.209928166Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:41:56.209985 env[1160]: time="2024-04-12T18:41:56.209975608Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:41:56.210050 env[1160]: time="2024-04-12T18:41:56.210040616Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:41:56.210099 env[1160]: time="2024-04-12T18:41:56.210089539Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:41:56.212711 env[1160]: time="2024-04-12T18:41:56.212693466Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:41:56.212792 env[1160]: time="2024-04-12T18:41:56.212781074Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:41:56.212849 env[1160]: time="2024-04-12T18:41:56.212839201Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:41:56.212909 env[1160]: time="2024-04-12T18:41:56.212899173Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.212954 env[1160]: time="2024-04-12T18:41:56.212945072Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213003 env[1160]: time="2024-04-12T18:41:56.212993436Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213058 env[1160]: time="2024-04-12T18:41:56.213048942Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213103 env[1160]: time="2024-04-12T18:41:56.213093877Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213153 env[1160]: time="2024-04-12T18:41:56.213143914Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213198 env[1160]: time="2024-04-12T18:41:56.213189177Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213247 env[1160]: time="2024-04-12T18:41:56.213236107Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.213336 env[1160]: time="2024-04-12T18:41:56.213326883Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:41:56.213444 env[1160]: time="2024-04-12T18:41:56.213435345Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:41:56.213612 env[1160]: time="2024-04-12T18:41:56.213603860Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:41:56.214147 env[1160]: time="2024-04-12T18:41:56.214135117Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:41:56.214634 env[1160]: time="2024-04-12T18:41:56.214619743Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.214735 env[1160]: time="2024-04-12T18:41:56.214721276Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:41:56.214851 env[1160]: time="2024-04-12T18:41:56.214841105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215338 env[1160]: time="2024-04-12T18:41:56.215327568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215509 env[1160]: time="2024-04-12T18:41:56.215489331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215694 env[1160]: time="2024-04-12T18:41:56.215681591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215754 env[1160]: time="2024-04-12T18:41:56.215744424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215802 env[1160]: time="2024-04-12T18:41:56.215791090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215852 env[1160]: time="2024-04-12T18:41:56.215841643Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.215908 env[1160]: time="2024-04-12T18:41:56.215895764Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.216576 env[1160]: time="2024-04-12T18:41:56.216564623Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:41:56.216707 env[1160]: time="2024-04-12T18:41:56.216696453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.217575 env[1160]: time="2024-04-12T18:41:56.217562191Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.217636 env[1160]: time="2024-04-12T18:41:56.217624959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.217985 env[1160]: time="2024-04-12T18:41:56.217974794Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:41:56.218039 env[1160]: time="2024-04-12T18:41:56.218027081Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:41:56.221896 env[1160]: time="2024-04-12T18:41:56.221873803Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:41:56.222002 env[1160]: time="2024-04-12T18:41:56.221988697Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:41:56.222412 env[1160]: time="2024-04-12T18:41:56.222400789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:41:56.224253 env[1160]: time="2024-04-12T18:41:56.224213908Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:41:56.226187 env[1160]: time="2024-04-12T18:41:56.224422231Z" level=info msg="Connect containerd service" Apr 12 18:41:56.226187 env[1160]: time="2024-04-12T18:41:56.224523213Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:41:56.227768 env[1160]: time="2024-04-12T18:41:56.227749770Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:41:56.227962 env[1160]: time="2024-04-12T18:41:56.227940570Z" level=info msg="Start subscribing containerd event" Apr 12 18:41:56.227991 env[1160]: time="2024-04-12T18:41:56.227970895Z" level=info msg="Start recovering state" Apr 12 18:41:56.228027 env[1160]: time="2024-04-12T18:41:56.228016820Z" level=info msg="Start event monitor" Apr 12 18:41:56.228027 env[1160]: time="2024-04-12T18:41:56.228026380Z" level=info msg="Start snapshots syncer" Apr 12 18:41:56.228073 env[1160]: time="2024-04-12T18:41:56.228032623Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:41:56.228073 env[1160]: time="2024-04-12T18:41:56.228036884Z" level=info msg="Start streaming server" Apr 12 18:41:56.228134 env[1160]: time="2024-04-12T18:41:56.228123222Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:41:56.228160 env[1160]: time="2024-04-12T18:41:56.228150987Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:41:56.228495 env[1160]: time="2024-04-12T18:41:56.228178927Z" level=info msg="containerd successfully booted in 0.125130s" Apr 12 18:41:56.228229 systemd[1]: Started containerd.service. Apr 12 18:41:56.248526 tar[1151]: ./vlan Apr 12 18:41:56.320846 tar[1151]: ./host-device Apr 12 18:41:56.381694 tar[1151]: ./tuning Apr 12 18:41:56.440370 tar[1151]: ./vrf Apr 12 18:41:56.497684 tar[1151]: ./sbr Apr 12 18:41:56.559403 tar[1151]: ./tap Apr 12 18:41:56.578666 systemd[1]: Finished prepare-critools.service. Apr 12 18:41:56.613086 tar[1151]: ./dhcp Apr 12 18:41:56.680429 tar[1151]: ./static Apr 12 18:41:56.699498 sshd_keygen[1168]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:41:56.699714 tar[1151]: ./firewall Apr 12 18:41:56.729508 systemd[1]: Finished sshd-keygen.service. Apr 12 18:41:56.730681 systemd[1]: Starting issuegen.service... Apr 12 18:41:56.731338 tar[1151]: ./macvlan Apr 12 18:41:56.733943 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:41:56.734024 systemd[1]: Finished issuegen.service. Apr 12 18:41:56.735061 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:41:56.744598 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:41:56.745577 systemd[1]: Started getty@tty1.service. Apr 12 18:41:56.746353 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:41:56.746533 systemd[1]: Reached target getty.target. Apr 12 18:41:56.752492 tar[1153]: linux-amd64/LICENSE Apr 12 18:41:56.752536 tar[1153]: linux-amd64/README.md Apr 12 18:41:56.755082 systemd[1]: Finished prepare-helm.service. Apr 12 18:41:56.763508 tar[1151]: ./dummy Apr 12 18:41:56.788487 tar[1151]: ./bridge Apr 12 18:41:56.815536 tar[1151]: ./ipvlan Apr 12 18:41:56.840328 tar[1151]: ./portmap Apr 12 18:41:56.864504 tar[1151]: ./host-local Apr 12 18:41:56.910853 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:41:56.911132 systemd[1]: Reached target multi-user.target. Apr 12 18:41:56.912179 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:41:56.916657 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:41:56.916754 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:41:56.916987 systemd[1]: Startup finished in 960ms (kernel) + 6.915s (initrd) + 6.968s (userspace) = 14.845s. Apr 12 18:41:57.275710 locksmithd[1200]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:41:57.298994 login[1262]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:41:57.300307 login[1263]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:41:57.307139 systemd[1]: Created slice user-500.slice. Apr 12 18:41:57.307980 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:41:57.310630 systemd-logind[1143]: New session 1 of user core. Apr 12 18:41:57.312715 systemd-logind[1143]: New session 2 of user core. Apr 12 18:41:57.315160 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:41:57.316094 systemd[1]: Starting user@500.service... Apr 12 18:41:57.331238 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:57.386181 systemd[1273]: Queued start job for default target default.target. Apr 12 18:41:57.386691 systemd[1273]: Reached target paths.target. Apr 12 18:41:57.386764 systemd[1273]: Reached target sockets.target. Apr 12 18:41:57.386878 systemd[1273]: Reached target timers.target. Apr 12 18:41:57.386935 systemd[1273]: Reached target basic.target. Apr 12 18:41:57.387041 systemd[1273]: Reached target default.target. Apr 12 18:41:57.387078 systemd[1]: Started user@500.service. Apr 12 18:41:57.387156 systemd[1273]: Startup finished in 51ms. Apr 12 18:41:57.387827 systemd[1]: Started session-1.scope. Apr 12 18:41:57.388342 systemd[1]: Started session-2.scope. Apr 12 18:42:36.205299 systemd[1]: Created slice system-sshd.slice. Apr 12 18:42:36.206132 systemd[1]: Started sshd@0-139.178.70.105:22-139.178.89.65:43496.service. Apr 12 18:42:36.265176 sshd[1294]: Accepted publickey for core from 139.178.89.65 port 43496 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.266095 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.270224 systemd[1]: Started session-3.scope. Apr 12 18:42:36.270642 systemd-logind[1143]: New session 3 of user core. Apr 12 18:42:36.319417 systemd[1]: Started sshd@1-139.178.70.105:22-139.178.89.65:43506.service. Apr 12 18:42:36.352718 sshd[1299]: Accepted publickey for core from 139.178.89.65 port 43506 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.353689 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.356801 systemd[1]: Started session-4.scope. Apr 12 18:42:36.357099 systemd-logind[1143]: New session 4 of user core. Apr 12 18:42:36.408096 sshd[1299]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:36.408909 systemd[1]: Started sshd@2-139.178.70.105:22-139.178.89.65:43514.service. Apr 12 18:42:36.410415 systemd[1]: sshd@1-139.178.70.105:22-139.178.89.65:43506.service: Deactivated successfully. Apr 12 18:42:36.410786 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:42:36.411393 systemd-logind[1143]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:42:36.411914 systemd-logind[1143]: Removed session 4. Apr 12 18:42:36.435080 sshd[1304]: Accepted publickey for core from 139.178.89.65 port 43514 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.435925 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.438654 systemd[1]: Started session-5.scope. Apr 12 18:42:36.439478 systemd-logind[1143]: New session 5 of user core. Apr 12 18:42:36.486288 sshd[1304]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:36.488626 systemd[1]: sshd@2-139.178.70.105:22-139.178.89.65:43514.service: Deactivated successfully. Apr 12 18:42:36.488972 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:42:36.489362 systemd-logind[1143]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:42:36.490117 systemd[1]: Started sshd@3-139.178.70.105:22-139.178.89.65:43526.service. Apr 12 18:42:36.490654 systemd-logind[1143]: Removed session 5. Apr 12 18:42:36.517630 sshd[1311]: Accepted publickey for core from 139.178.89.65 port 43526 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.518521 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.521574 systemd-logind[1143]: New session 6 of user core. Apr 12 18:42:36.522085 systemd[1]: Started session-6.scope. Apr 12 18:42:36.571562 sshd[1311]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:36.573443 systemd[1]: sshd@3-139.178.70.105:22-139.178.89.65:43526.service: Deactivated successfully. Apr 12 18:42:36.573821 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:42:36.574475 systemd-logind[1143]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:42:36.575183 systemd[1]: Started sshd@4-139.178.70.105:22-139.178.89.65:43540.service. Apr 12 18:42:36.575869 systemd-logind[1143]: Removed session 6. Apr 12 18:42:36.602474 sshd[1317]: Accepted publickey for core from 139.178.89.65 port 43540 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.603253 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.605745 systemd-logind[1143]: New session 7 of user core. Apr 12 18:42:36.606209 systemd[1]: Started session-7.scope. Apr 12 18:42:36.738938 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:42:36.739100 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:36.745710 dbus-daemon[1134]: Э\u001e\x85\u0001V: received setenforce notice (enforcing=1594571360) Apr 12 18:42:36.746989 sudo[1320]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:36.749182 sshd[1317]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:36.752040 systemd[1]: sshd@4-139.178.70.105:22-139.178.89.65:43540.service: Deactivated successfully. Apr 12 18:42:36.752616 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:42:36.753676 systemd-logind[1143]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:42:36.754467 systemd[1]: Started sshd@5-139.178.70.105:22-139.178.89.65:43556.service. Apr 12 18:42:36.755758 systemd-logind[1143]: Removed session 7. Apr 12 18:42:36.785640 sshd[1324]: Accepted publickey for core from 139.178.89.65 port 43556 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.786813 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.790582 systemd[1]: Started session-8.scope. Apr 12 18:42:36.790974 systemd-logind[1143]: New session 8 of user core. Apr 12 18:42:36.840615 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:42:36.841006 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:36.843104 sudo[1328]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:36.846042 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:42:36.846188 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:36.853223 systemd[1]: Stopping audit-rules.service... Apr 12 18:42:36.856550 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 18:42:36.856595 kernel: audit: type=1305 audit(1712947356.852:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:42:36.852000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:42:36.857369 auditctl[1331]: No rules Apr 12 18:42:36.857601 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:42:36.857731 systemd[1]: Stopped audit-rules.service. Apr 12 18:42:36.852000 audit[1331]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe65315b60 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:36.859087 systemd[1]: Starting audit-rules.service... Apr 12 18:42:36.852000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:42:36.864924 kernel: audit: type=1300 audit(1712947356.852:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe65315b60 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:36.864957 kernel: audit: type=1327 audit(1712947356.852:166): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:42:36.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.868204 kernel: audit: type=1131 audit(1712947356.856:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.874332 augenrules[1348]: No rules Apr 12 18:42:36.874821 systemd[1]: Finished audit-rules.service. Apr 12 18:42:36.875310 sudo[1327]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:36.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.879217 kernel: audit: type=1130 audit(1712947356.873:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.879149 sshd[1324]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:36.873000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.881726 systemd[1]: Started sshd@6-139.178.70.105:22-139.178.89.65:43568.service. Apr 12 18:42:36.882019 systemd[1]: sshd@5-139.178.70.105:22-139.178.89.65:43556.service: Deactivated successfully. Apr 12 18:42:36.882391 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:42:36.883232 systemd-logind[1143]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:42:36.883747 kernel: audit: type=1106 audit(1712947356.873:169): pid=1327 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.883777 kernel: audit: type=1104 audit(1712947356.873:170): pid=1327 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.873000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.884138 systemd-logind[1143]: Removed session 8. Apr 12 18:42:36.878000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.889762 kernel: audit: type=1106 audit(1712947356.878:171): pid=1324 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.889860 kernel: audit: type=1104 audit(1712947356.878:172): pid=1324 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.878000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:43568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.895487 kernel: audit: type=1130 audit(1712947356.880:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:43568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.105:22-139.178.89.65:43556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.911000 audit[1353]: USER_ACCT pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.913180 sshd[1353]: Accepted publickey for core from 139.178.89.65 port 43568 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:42:36.912000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.912000 audit[1353]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc90f4330 a2=3 a3=0 items=0 ppid=1 pid=1353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:36.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:36.914446 sshd[1353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:36.917830 systemd[1]: Started session-9.scope. Apr 12 18:42:36.918584 systemd-logind[1143]: New session 9 of user core. Apr 12 18:42:36.919000 audit[1353]: USER_START pid=1353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.920000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:42:36.967783 sudo[1357]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:42:36.966000 audit[1357]: USER_ACCT pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.968230 sudo[1357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:36.966000 audit[1357]: CRED_REFR pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:36.968000 audit[1357]: USER_START pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:37.508275 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:42:37.516451 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:42:37.516669 systemd[1]: Reached target network-online.target. Apr 12 18:42:37.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:37.517587 systemd[1]: Starting docker.service... Apr 12 18:42:37.546031 env[1374]: time="2024-04-12T18:42:37.545991314Z" level=info msg="Starting up" Apr 12 18:42:37.547075 env[1374]: time="2024-04-12T18:42:37.547062955Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:42:37.547123 env[1374]: time="2024-04-12T18:42:37.547112682Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:42:37.547180 env[1374]: time="2024-04-12T18:42:37.547168401Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:42:37.547225 env[1374]: time="2024-04-12T18:42:37.547215339Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:42:37.548417 env[1374]: time="2024-04-12T18:42:37.548400129Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:42:37.548417 env[1374]: time="2024-04-12T18:42:37.548412406Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:42:37.548482 env[1374]: time="2024-04-12T18:42:37.548423571Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:42:37.548482 env[1374]: time="2024-04-12T18:42:37.548429082Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:42:37.576571 env[1374]: time="2024-04-12T18:42:37.576545758Z" level=info msg="Loading containers: start." Apr 12 18:42:37.616000 audit[1405]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.616000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe2125dd20 a2=0 a3=7ffe2125dd0c items=0 ppid=1374 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:42:37.617000 audit[1407]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.617000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe582482c0 a2=0 a3=7ffe582482ac items=0 ppid=1374 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:42:37.618000 audit[1409]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.618000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe7b4c9d20 a2=0 a3=7ffe7b4c9d0c items=0 ppid=1374 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:42:37.619000 audit[1411]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.619000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff70efdd90 a2=0 a3=7fff70efdd7c items=0 ppid=1374 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.619000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:42:37.621000 audit[1413]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.621000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd76d754d0 a2=0 a3=7ffd76d754bc items=0 ppid=1374 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.621000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:42:37.633000 audit[1418]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.633000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc4b56df0 a2=0 a3=7ffcc4b56ddc items=0 ppid=1374 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.633000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:42:37.636000 audit[1420]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.636000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc92993f90 a2=0 a3=7ffc92993f7c items=0 ppid=1374 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.636000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:42:37.637000 audit[1422]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.637000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeaa2ca220 a2=0 a3=7ffeaa2ca20c items=0 ppid=1374 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.637000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:42:37.638000 audit[1424]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.638000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd52cb4bc0 a2=0 a3=7ffd52cb4bac items=0 ppid=1374 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:37.654000 audit[1428]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.654000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff96484040 a2=0 a3=7fff9648402c items=0 ppid=1374 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:37.654000 audit[1429]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.654000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffd178b930 a2=0 a3=7fffd178b91c items=0 ppid=1374 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:37.676556 kernel: Initializing XFRM netlink socket Apr 12 18:42:37.720685 env[1374]: time="2024-04-12T18:42:37.720661640Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:42:37.735000 audit[1437]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.735000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd658d4a40 a2=0 a3=7ffd658d4a2c items=0 ppid=1374 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.735000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:42:37.744000 audit[1440]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.744000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffec56826c0 a2=0 a3=7ffec56826ac items=0 ppid=1374 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:42:37.746000 audit[1443]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.746000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcf55f8270 a2=0 a3=7ffcf55f825c items=0 ppid=1374 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:42:37.748000 audit[1445]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.748000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc05550750 a2=0 a3=7ffc0555073c items=0 ppid=1374 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:42:37.749000 audit[1447]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.749000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffce4187870 a2=0 a3=7ffce418785c items=0 ppid=1374 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:42:37.751000 audit[1449]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.751000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff2b3f7ab0 a2=0 a3=7fff2b3f7a9c items=0 ppid=1374 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:42:37.752000 audit[1451]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.752000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc16310db0 a2=0 a3=7ffc16310d9c items=0 ppid=1374 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:42:37.757000 audit[1454]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.757000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc8cf20420 a2=0 a3=7ffc8cf2040c items=0 ppid=1374 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:42:37.760000 audit[1456]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.760000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffa14beec0 a2=0 a3=7fffa14beeac items=0 ppid=1374 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:42:37.761000 audit[1458]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.761000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe5d082c40 a2=0 a3=7ffe5d082c2c items=0 ppid=1374 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:42:37.762000 audit[1460]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.762000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc4719430 a2=0 a3=7ffcc471941c items=0 ppid=1374 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:42:37.764694 systemd-networkd[1067]: docker0: Link UP Apr 12 18:42:37.767000 audit[1464]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.767000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5079c570 a2=0 a3=7ffe5079c55c items=0 ppid=1374 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:37.767000 audit[1465]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:37.767000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff8b8c8f10 a2=0 a3=7fff8b8c8efc items=0 ppid=1374 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:37.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:37.769604 env[1374]: time="2024-04-12T18:42:37.769590599Z" level=info msg="Loading containers: done." Apr 12 18:42:37.776259 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck740289105-merged.mount: Deactivated successfully. Apr 12 18:42:37.793832 env[1374]: time="2024-04-12T18:42:37.793814382Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:42:37.794019 env[1374]: time="2024-04-12T18:42:37.794008973Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:42:37.794124 env[1374]: time="2024-04-12T18:42:37.794114985Z" level=info msg="Daemon has completed initialization" Apr 12 18:42:37.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:37.827627 systemd[1]: Started docker.service. Apr 12 18:42:37.830142 env[1374]: time="2024-04-12T18:42:37.830109956Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:42:37.843242 systemd[1]: Reloading. Apr 12 18:42:37.893696 /usr/lib/systemd/system-generators/torcx-generator[1512]: time="2024-04-12T18:42:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:42:37.893914 /usr/lib/systemd/system-generators/torcx-generator[1512]: time="2024-04-12T18:42:37Z" level=info msg="torcx already run" Apr 12 18:42:37.942324 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:42:37.942337 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:42:37.953722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.990000 audit: BPF prog-id=34 op=LOAD Apr 12 18:42:37.990000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit: BPF prog-id=35 op=LOAD Apr 12 18:42:37.991000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit: BPF prog-id=36 op=LOAD Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.991000 audit: BPF prog-id=37 op=LOAD Apr 12 18:42:37.991000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:42:37.991000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.992000 audit: BPF prog-id=38 op=LOAD Apr 12 18:42:37.992000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit: BPF prog-id=39 op=LOAD Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit: BPF prog-id=40 op=LOAD Apr 12 18:42:37.993000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:42:37.993000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.993000 audit: BPF prog-id=41 op=LOAD Apr 12 18:42:37.993000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit: BPF prog-id=42 op=LOAD Apr 12 18:42:37.994000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit: BPF prog-id=43 op=LOAD Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.994000 audit: BPF prog-id=44 op=LOAD Apr 12 18:42:37.994000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:42:37.994000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit: BPF prog-id=45 op=LOAD Apr 12 18:42:37.995000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit: BPF prog-id=46 op=LOAD Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.995000 audit: BPF prog-id=47 op=LOAD Apr 12 18:42:37.995000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:42:37.995000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:37.996000 audit: BPF prog-id=48 op=LOAD Apr 12 18:42:37.996000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:42:38.002036 systemd[1]: Started kubelet.service. Apr 12 18:42:38.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:38.034398 kubelet[1572]: E0412 18:42:38.034337 1572 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:42:38.037878 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:38.037949 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:38.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:38.704174 env[1160]: time="2024-04-12T18:42:38.704003855Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:42:39.294448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount180970907.mount: Deactivated successfully. Apr 12 18:42:41.075185 update_engine[1144]: I0412 18:42:41.075114 1144 update_attempter.cc:509] Updating boot flags... Apr 12 18:42:41.186789 env[1160]: time="2024-04-12T18:42:41.186750141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:41.195631 env[1160]: time="2024-04-12T18:42:41.195595040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:41.201488 env[1160]: time="2024-04-12T18:42:41.201171651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:41.211526 env[1160]: time="2024-04-12T18:42:41.211328876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:41.211762 env[1160]: time="2024-04-12T18:42:41.211735316Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533\"" Apr 12 18:42:41.221164 env[1160]: time="2024-04-12T18:42:41.220953833Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:42:43.266220 env[1160]: time="2024-04-12T18:42:43.266158821Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:43.282402 env[1160]: time="2024-04-12T18:42:43.282381453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:43.292739 env[1160]: time="2024-04-12T18:42:43.292714235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:43.300604 env[1160]: time="2024-04-12T18:42:43.300580764Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:43.301199 env[1160]: time="2024-04-12T18:42:43.301179436Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3\"" Apr 12 18:42:43.309927 env[1160]: time="2024-04-12T18:42:43.309901196Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:42:44.954529 env[1160]: time="2024-04-12T18:42:44.954484608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.971957 env[1160]: time="2024-04-12T18:42:44.971927064Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.985669 env[1160]: time="2024-04-12T18:42:44.985641252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.995464 env[1160]: time="2024-04-12T18:42:44.995392468Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.995765 env[1160]: time="2024-04-12T18:42:44.995739140Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b\"" Apr 12 18:42:45.002426 env[1160]: time="2024-04-12T18:42:45.002399043Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:42:46.133699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1048140648.mount: Deactivated successfully. Apr 12 18:42:46.672252 env[1160]: time="2024-04-12T18:42:46.672215441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:46.687596 env[1160]: time="2024-04-12T18:42:46.687567947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:46.695716 env[1160]: time="2024-04-12T18:42:46.695695831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:46.702686 env[1160]: time="2024-04-12T18:42:46.702668700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:46.702972 env[1160]: time="2024-04-12T18:42:46.702955173Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 18:42:46.708431 env[1160]: time="2024-04-12T18:42:46.708407005Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:42:47.199191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount364439208.mount: Deactivated successfully. Apr 12 18:42:48.067593 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:42:48.067787 systemd[1]: Stopped kubelet.service. Apr 12 18:42:48.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:48.070312 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:42:48.070361 kernel: audit: type=1130 audit(1712947368.067:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:48.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:48.076109 kernel: audit: type=1131 audit(1712947368.067:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:48.076415 systemd[1]: Started kubelet.service. Apr 12 18:42:48.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:48.080561 kernel: audit: type=1130 audit(1712947368.075:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:48.114717 kubelet[1628]: E0412 18:42:48.114684 1628 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:42:48.116667 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:48.116749 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:48.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:48.119617 kernel: audit: type=1131 audit(1712947368.116:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:48.335772 env[1160]: time="2024-04-12T18:42:48.335494244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.336845 env[1160]: time="2024-04-12T18:42:48.336806857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.338307 env[1160]: time="2024-04-12T18:42:48.338288528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.339640 env[1160]: time="2024-04-12T18:42:48.339623712Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.340590 env[1160]: time="2024-04-12T18:42:48.340572997Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Apr 12 18:42:48.346134 env[1160]: time="2024-04-12T18:42:48.346108305Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:42:48.766614 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4002151606.mount: Deactivated successfully. Apr 12 18:42:48.768803 env[1160]: time="2024-04-12T18:42:48.768768279Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.769755 env[1160]: time="2024-04-12T18:42:48.769737760Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.770599 env[1160]: time="2024-04-12T18:42:48.770583267Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.771356 env[1160]: time="2024-04-12T18:42:48.771340432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.771648 env[1160]: time="2024-04-12T18:42:48.771630304Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:42:48.777383 env[1160]: time="2024-04-12T18:42:48.777365081Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:42:49.204853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2261199007.mount: Deactivated successfully. Apr 12 18:42:51.688112 env[1160]: time="2024-04-12T18:42:51.688078614Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:51.709291 env[1160]: time="2024-04-12T18:42:51.709263927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:51.723279 env[1160]: time="2024-04-12T18:42:51.723253981Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:51.732880 env[1160]: time="2024-04-12T18:42:51.732858338Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:51.733673 env[1160]: time="2024-04-12T18:42:51.733638298Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Apr 12 18:42:53.368915 systemd[1]: Stopped kubelet.service. Apr 12 18:42:53.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:53.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:53.374889 kernel: audit: type=1130 audit(1712947373.367:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:53.374993 kernel: audit: type=1131 audit(1712947373.367:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:53.386491 systemd[1]: Reloading. Apr 12 18:42:53.434840 /usr/lib/systemd/system-generators/torcx-generator[1729]: time="2024-04-12T18:42:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:42:53.434856 /usr/lib/systemd/system-generators/torcx-generator[1729]: time="2024-04-12T18:42:53Z" level=info msg="torcx already run" Apr 12 18:42:53.486757 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:42:53.486769 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:42:53.497995 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.539550 kernel: audit: type=1400 audit(1712947373.534:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.541708 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:42:53.541751 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:42:53.541778 kernel: audit: backlog limit exceeded Apr 12 18:42:53.545086 kernel: audit: type=1400 audit(1712947373.534:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.545119 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549599 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:42:53.549654 kernel: audit: type=1400 audit(1712947373.534:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.534000 audit: BPF prog-id=49 op=LOAD Apr 12 18:42:53.534000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit: BPF prog-id=50 op=LOAD Apr 12 18:42:53.537000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit: BPF prog-id=51 op=LOAD Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit: BPF prog-id=52 op=LOAD Apr 12 18:42:53.537000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:42:53.537000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit: BPF prog-id=53 op=LOAD Apr 12 18:42:53.538000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.548000 audit: BPF prog-id=56 op=LOAD Apr 12 18:42:53.548000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit: BPF prog-id=57 op=LOAD Apr 12 18:42:53.549000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.549000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit: BPF prog-id=60 op=LOAD Apr 12 18:42:53.550000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit: BPF prog-id=61 op=LOAD Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.551000 audit: BPF prog-id=63 op=LOAD Apr 12 18:42:53.551000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:42:53.563164 systemd[1]: Started kubelet.service. Apr 12 18:42:53.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:53.599138 kubelet[1789]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:42:53.599418 kubelet[1789]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:42:53.599464 kubelet[1789]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:42:53.599577 kubelet[1789]: I0412 18:42:53.599559 1789 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:42:53.843074 kubelet[1789]: I0412 18:42:53.843055 1789 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:42:53.843179 kubelet[1789]: I0412 18:42:53.843171 1789 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:42:53.843352 kubelet[1789]: I0412 18:42:53.843343 1789 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:42:53.845935 kubelet[1789]: E0412 18:42:53.845919 1789 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.846099 kubelet[1789]: I0412 18:42:53.846085 1789 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:42:53.851053 kubelet[1789]: I0412 18:42:53.851042 1789 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:42:53.851286 kubelet[1789]: I0412 18:42:53.851276 1789 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:42:53.851420 kubelet[1789]: I0412 18:42:53.851410 1789 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:42:53.851564 kubelet[1789]: I0412 18:42:53.851555 1789 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:42:53.851618 kubelet[1789]: I0412 18:42:53.851610 1789 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:42:53.851714 kubelet[1789]: I0412 18:42:53.851706 1789 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:42:53.851810 kubelet[1789]: I0412 18:42:53.851803 1789 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:42:53.852103 kubelet[1789]: W0412 18:42:53.852082 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.852163 kubelet[1789]: E0412 18:42:53.852154 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.852216 kubelet[1789]: I0412 18:42:53.852208 1789 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:42:53.852280 kubelet[1789]: I0412 18:42:53.852273 1789 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:42:53.852328 kubelet[1789]: I0412 18:42:53.852321 1789 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:42:53.852748 kubelet[1789]: I0412 18:42:53.852740 1789 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:42:53.852936 kubelet[1789]: I0412 18:42:53.852927 1789 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:42:53.853012 kubelet[1789]: W0412 18:42:53.853005 1789 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:42:53.853367 kubelet[1789]: I0412 18:42:53.853358 1789 server.go:1256] "Started kubelet" Apr 12 18:42:53.853468 kubelet[1789]: W0412 18:42:53.853449 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.853528 kubelet[1789]: E0412 18:42:53.853520 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.852000 audit[1789]: AVC avc: denied { mac_admin } for pid=1789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:53.852000 audit[1789]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000932cf0 a1=c000be5758 a2=c000932cc0 a3=25 items=0 ppid=1 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:53.855076 kubelet[1789]: E0412 18:42:53.854709 1789 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.105:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.105:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17c59c8f9977847e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-04-12 18:42:53.853344894 +0000 UTC m=+0.286246926,LastTimestamp:2024-04-12 18:42:53.853344894 +0000 UTC m=+0.286246926,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Apr 12 18:42:53.855076 kubelet[1789]: I0412 18:42:53.854763 1789 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:42:53.855076 kubelet[1789]: I0412 18:42:53.854888 1789 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:42:53.855076 kubelet[1789]: I0412 18:42:53.854911 1789 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:42:53.855249 kubelet[1789]: I0412 18:42:53.855239 1789 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:42:53.853000 audit[1789]: AVC avc: denied { mac_admin } for pid=1789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.853000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:53.853000 audit[1789]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00095c1e0 a1=c000be5770 a2=c000932d80 a3=25 items=0 ppid=1 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.853000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:53.855448 kubelet[1789]: I0412 18:42:53.855432 1789 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:42:53.855505 kubelet[1789]: I0412 18:42:53.855496 1789 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:42:53.855606 kubelet[1789]: I0412 18:42:53.855599 1789 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:42:53.858059 kubelet[1789]: I0412 18:42:53.857791 1789 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:42:53.858059 kubelet[1789]: I0412 18:42:53.857826 1789 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:42:53.858059 kubelet[1789]: I0412 18:42:53.857847 1789 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:42:53.858059 kubelet[1789]: W0412 18:42:53.857985 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.858059 kubelet[1789]: E0412 18:42:53.858006 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.858482 kubelet[1789]: E0412 18:42:53.858229 1789 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="200ms" Apr 12 18:42:53.858482 kubelet[1789]: E0412 18:42:53.858316 1789 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:42:53.858560 kubelet[1789]: I0412 18:42:53.858554 1789 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:42:53.858592 kubelet[1789]: I0412 18:42:53.858586 1789 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:42:53.859087 kubelet[1789]: I0412 18:42:53.859074 1789 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:42:53.861000 audit[1800]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.861000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe95653f60 a2=0 a3=7ffe95653f4c items=0 ppid=1789 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:42:53.861000 audit[1801]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.861000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9078eaf0 a2=0 a3=7ffd9078eadc items=0 ppid=1789 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:42:53.862000 audit[1803]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.862000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffebf172e60 a2=0 a3=7ffebf172e4c items=0 ppid=1789 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:42:53.864000 audit[1805]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.864000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd453d340 a2=0 a3=7fffd453d32c items=0 ppid=1789 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:42:53.882126 kubelet[1789]: I0412 18:42:53.882102 1789 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:42:53.882126 kubelet[1789]: I0412 18:42:53.882118 1789 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:42:53.882126 kubelet[1789]: I0412 18:42:53.882131 1789 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:42:53.904000 audit[1814]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.904000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcc9850bc0 a2=0 a3=7ffcc9850bac items=0 ppid=1789 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:42:53.905000 audit[1815]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:53.905000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe20852e60 a2=0 a3=7ffe20852e4c items=0 ppid=1789 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:42:53.905000 audit[1816]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.906000 audit[1817]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:53.906000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffce242560 a2=0 a3=7fffce24254c items=0 ppid=1789 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:42:53.905000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe331dc660 a2=0 a3=10e3 items=0 ppid=1789 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:42:53.907000 audit[1820]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.907000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda985e070 a2=0 a3=7ffda985e05c items=0 ppid=1789 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:42:53.907000 audit[1819]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:53.907000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe81953b90 a2=0 a3=7ffe81953b7c items=0 ppid=1789 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:42:53.908000 audit[1821]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:53.908000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffe747c30 a2=0 a3=7ffffe747c1c items=0 ppid=1789 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:42:53.908000 audit[1822]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:53.908000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6156c1d0 a2=0 a3=7ffc6156c1bc items=0 ppid=1789 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:42:53.925063 kubelet[1789]: I0412 18:42:53.906534 1789 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:42:53.925063 kubelet[1789]: I0412 18:42:53.907258 1789 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:42:53.925063 kubelet[1789]: I0412 18:42:53.907281 1789 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:42:53.925063 kubelet[1789]: I0412 18:42:53.907294 1789 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:42:53.925063 kubelet[1789]: E0412 18:42:53.907371 1789 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:42:53.925063 kubelet[1789]: W0412 18:42:53.907837 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.925063 kubelet[1789]: E0412 18:42:53.907855 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:53.932807 kubelet[1789]: I0412 18:42:53.932783 1789 policy_none.go:49] "None policy: Start" Apr 12 18:42:53.933276 kubelet[1789]: I0412 18:42:53.933262 1789 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:42:53.933276 kubelet[1789]: I0412 18:42:53.933279 1789 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:42:53.958980 kubelet[1789]: I0412 18:42:53.958971 1789 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:42:53.959953 kubelet[1789]: E0412 18:42:53.959244 1789 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Apr 12 18:42:53.980162 systemd[1]: Created slice kubepods.slice. Apr 12 18:42:53.982641 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:42:53.984452 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:42:53.990008 kubelet[1789]: I0412 18:42:53.989994 1789 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:42:53.988000 audit[1789]: AVC avc: denied { mac_admin } for pid=1789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.988000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:53.988000 audit[1789]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ebd5f0 a1=c0009d4ab0 a2=c000ebd5c0 a3=25 items=0 ppid=1 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.988000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:53.990189 kubelet[1789]: I0412 18:42:53.990033 1789 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:42:53.990189 kubelet[1789]: I0412 18:42:53.990128 1789 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:42:53.993888 kubelet[1789]: E0412 18:42:53.993878 1789 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:42:54.007695 kubelet[1789]: I0412 18:42:54.007666 1789 topology_manager.go:215] "Topology Admit Handler" podUID="82268f61e3b0c50dcf2dc631262cf725" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:42:54.008729 kubelet[1789]: I0412 18:42:54.008706 1789 topology_manager.go:215] "Topology Admit Handler" podUID="f4e8212a5db7e0401319814fa9ad65c9" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:42:54.009590 kubelet[1789]: I0412 18:42:54.009580 1789 topology_manager.go:215] "Topology Admit Handler" podUID="5d5c5aff921df216fcba2c51c322ceb1" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:42:54.013840 systemd[1]: Created slice kubepods-burstable-podf4e8212a5db7e0401319814fa9ad65c9.slice. Apr 12 18:42:54.030392 systemd[1]: Created slice kubepods-burstable-pod82268f61e3b0c50dcf2dc631262cf725.slice. Apr 12 18:42:54.037395 systemd[1]: Created slice kubepods-burstable-pod5d5c5aff921df216fcba2c51c322ceb1.slice. Apr 12 18:42:54.058733 kubelet[1789]: E0412 18:42:54.058713 1789 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="400ms" Apr 12 18:42:54.059874 kubelet[1789]: I0412 18:42:54.059849 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5d5c5aff921df216fcba2c51c322ceb1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5d5c5aff921df216fcba2c51c322ceb1\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:42:54.059979 kubelet[1789]: I0412 18:42:54.059968 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/82268f61e3b0c50dcf2dc631262cf725-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"82268f61e3b0c50dcf2dc631262cf725\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:54.060071 kubelet[1789]: I0412 18:42:54.060062 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/82268f61e3b0c50dcf2dc631262cf725-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"82268f61e3b0c50dcf2dc631262cf725\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:54.060161 kubelet[1789]: I0412 18:42:54.060151 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:54.060249 kubelet[1789]: I0412 18:42:54.060240 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:54.060422 kubelet[1789]: I0412 18:42:54.060412 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/82268f61e3b0c50dcf2dc631262cf725-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"82268f61e3b0c50dcf2dc631262cf725\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:54.060510 kubelet[1789]: I0412 18:42:54.060501 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:54.060608 kubelet[1789]: I0412 18:42:54.060599 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:54.060695 kubelet[1789]: I0412 18:42:54.060686 1789 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:54.160841 kubelet[1789]: I0412 18:42:54.160779 1789 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:42:54.163197 kubelet[1789]: E0412 18:42:54.163173 1789 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Apr 12 18:42:54.329422 env[1160]: time="2024-04-12T18:42:54.329382691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:f4e8212a5db7e0401319814fa9ad65c9,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:54.332104 env[1160]: time="2024-04-12T18:42:54.332044451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:82268f61e3b0c50dcf2dc631262cf725,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:54.339548 env[1160]: time="2024-04-12T18:42:54.339483629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5d5c5aff921df216fcba2c51c322ceb1,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:54.459861 kubelet[1789]: E0412 18:42:54.459799 1789 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="800ms" Apr 12 18:42:54.564163 kubelet[1789]: I0412 18:42:54.564148 1789 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:42:54.564449 kubelet[1789]: E0412 18:42:54.564441 1789 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Apr 12 18:42:54.815866 kubelet[1789]: W0412 18:42:54.815783 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:54.816161 kubelet[1789]: E0412 18:42:54.816151 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:54.854726 kubelet[1789]: W0412 18:42:54.854690 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:54.854841 kubelet[1789]: E0412 18:42:54.854832 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:55.098420 kubelet[1789]: W0412 18:42:55.098377 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:55.098574 kubelet[1789]: E0412 18:42:55.098566 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:55.184254 kubelet[1789]: W0412 18:42:55.184214 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:55.184254 kubelet[1789]: E0412 18:42:55.184255 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:55.204052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3898240673.mount: Deactivated successfully. Apr 12 18:42:55.254999 env[1160]: time="2024-04-12T18:42:55.254969349Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.257592 env[1160]: time="2024-04-12T18:42:55.257566333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.260381 env[1160]: time="2024-04-12T18:42:55.260351903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.260784 kubelet[1789]: E0412 18:42:55.260757 1789 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="1.6s" Apr 12 18:42:55.262061 env[1160]: time="2024-04-12T18:42:55.262040234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.263651 env[1160]: time="2024-04-12T18:42:55.263628915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.264159 env[1160]: time="2024-04-12T18:42:55.264145297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.266565 env[1160]: time="2024-04-12T18:42:55.266547609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.268886 env[1160]: time="2024-04-12T18:42:55.268859025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.269518 env[1160]: time="2024-04-12T18:42:55.269489889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.274995 env[1160]: time="2024-04-12T18:42:55.274892737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.275582 env[1160]: time="2024-04-12T18:42:55.275570159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.276095 env[1160]: time="2024-04-12T18:42:55.276079652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.279785 env[1160]: time="2024-04-12T18:42:55.279632790Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:55.279785 env[1160]: time="2024-04-12T18:42:55.279673073Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:55.279785 env[1160]: time="2024-04-12T18:42:55.279680819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:55.279966 env[1160]: time="2024-04-12T18:42:55.279928284Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0b1d721aec7bb1dae2e33bdfea97e581b16573c5729bf74ade4299c6acb3aa6 pid=1832 runtime=io.containerd.runc.v2 Apr 12 18:42:55.297627 systemd[1]: Started cri-containerd-b0b1d721aec7bb1dae2e33bdfea97e581b16573c5729bf74ade4299c6acb3aa6.scope. Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.305000 audit: BPF prog-id=64 op=LOAD Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1832 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623164373231616563376262316461653265333362646665613937 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1832 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623164373231616563376262316461653265333362646665613937 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.307000 audit: BPF prog-id=65 op=LOAD Apr 12 18:42:55.307000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021a350 items=0 ppid=1832 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623164373231616563376262316461653265333362646665613937 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.308000 audit: BPF prog-id=66 op=LOAD Apr 12 18:42:55.308000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021a398 items=0 ppid=1832 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623164373231616563376262316461653265333362646665613937 Apr 12 18:42:55.308000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:42:55.308000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.309000 audit: BPF prog-id=67 op=LOAD Apr 12 18:42:55.309000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021a7a8 items=0 ppid=1832 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623164373231616563376262316461653265333362646665613937 Apr 12 18:42:55.329978 env[1160]: time="2024-04-12T18:42:55.329941701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:82268f61e3b0c50dcf2dc631262cf725,Namespace:kube-system,Attempt:0,} returns sandbox id \"b0b1d721aec7bb1dae2e33bdfea97e581b16573c5729bf74ade4299c6acb3aa6\"" Apr 12 18:42:55.332069 env[1160]: time="2024-04-12T18:42:55.332051681Z" level=info msg="CreateContainer within sandbox \"b0b1d721aec7bb1dae2e33bdfea97e581b16573c5729bf74ade4299c6acb3aa6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:42:55.365889 kubelet[1789]: I0412 18:42:55.365829 1789 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:42:55.366717 kubelet[1789]: E0412 18:42:55.366702 1789 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Apr 12 18:42:55.396778 env[1160]: time="2024-04-12T18:42:55.396734393Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:55.396927 env[1160]: time="2024-04-12T18:42:55.396904748Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:55.397031 env[1160]: time="2024-04-12T18:42:55.397009594Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:55.397208 env[1160]: time="2024-04-12T18:42:55.397187044Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e58886e8906459b84fe4ad18535f5e3efe993a793a62ac0ac3e54578922bcccb pid=1872 runtime=io.containerd.runc.v2 Apr 12 18:42:55.405356 env[1160]: time="2024-04-12T18:42:55.404910417Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:55.405356 env[1160]: time="2024-04-12T18:42:55.404938199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:55.405356 env[1160]: time="2024-04-12T18:42:55.404947449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:55.405356 env[1160]: time="2024-04-12T18:42:55.405025240Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88ecab0dce9f3d7caddf48ed9a1257238c4b0f65734b2ece87c19e4bb1ee98a0 pid=1896 runtime=io.containerd.runc.v2 Apr 12 18:42:55.413500 systemd[1]: Started cri-containerd-e58886e8906459b84fe4ad18535f5e3efe993a793a62ac0ac3e54578922bcccb.scope. Apr 12 18:42:55.421669 systemd[1]: Started cri-containerd-88ecab0dce9f3d7caddf48ed9a1257238c4b0f65734b2ece87c19e4bb1ee98a0.scope. Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit: BPF prog-id=68 op=LOAD Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1872 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383838366538393036343539623834666534616431383533356635 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1872 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383838366538393036343539623834666534616431383533356635 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit: BPF prog-id=69 op=LOAD Apr 12 18:42:55.424000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1b60 items=0 ppid=1872 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383838366538393036343539623834666534616431383533356635 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.424000 audit: BPF prog-id=70 op=LOAD Apr 12 18:42:55.424000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1ba8 items=0 ppid=1872 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383838366538393036343539623834666534616431383533356635 Apr 12 18:42:55.424000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:42:55.425000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { perfmon } for pid=1885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit[1885]: AVC avc: denied { bpf } for pid=1885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.425000 audit: BPF prog-id=71 op=LOAD Apr 12 18:42:55.425000 audit[1885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1fb8 items=0 ppid=1872 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383838366538393036343539623834666534616431383533356635 Apr 12 18:42:55.439175 env[1160]: time="2024-04-12T18:42:55.439144125Z" level=info msg="CreateContainer within sandbox \"b0b1d721aec7bb1dae2e33bdfea97e581b16573c5729bf74ade4299c6acb3aa6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d0ad14ceaeaf8e709f278e230a0ab23d09c67209a29571c24ba68f8a36c882e5\"" Apr 12 18:42:55.439619 env[1160]: time="2024-04-12T18:42:55.439599541Z" level=info msg="StartContainer for \"d0ad14ceaeaf8e709f278e230a0ab23d09c67209a29571c24ba68f8a36c882e5\"" Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit: BPF prog-id=72 op=LOAD Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1896 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656361623064636539663364376361646466343865643961313235 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1896 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656361623064636539663364376361646466343865643961313235 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit: BPF prog-id=73 op=LOAD Apr 12 18:42:55.441000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001ced60 items=0 ppid=1896 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656361623064636539663364376361646466343865643961313235 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit: BPF prog-id=74 op=LOAD Apr 12 18:42:55.441000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001ceda8 items=0 ppid=1896 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656361623064636539663364376361646466343865643961313235 Apr 12 18:42:55.441000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:42:55.441000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.441000 audit: BPF prog-id=75 op=LOAD Apr 12 18:42:55.441000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cf1b8 items=0 ppid=1896 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838656361623064636539663364376361646466343865643961313235 Apr 12 18:42:55.466309 env[1160]: time="2024-04-12T18:42:55.466275089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5d5c5aff921df216fcba2c51c322ceb1,Namespace:kube-system,Attempt:0,} returns sandbox id \"e58886e8906459b84fe4ad18535f5e3efe993a793a62ac0ac3e54578922bcccb\"" Apr 12 18:42:55.468244 env[1160]: time="2024-04-12T18:42:55.468219219Z" level=info msg="CreateContainer within sandbox \"e58886e8906459b84fe4ad18535f5e3efe993a793a62ac0ac3e54578922bcccb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:42:55.474861 systemd[1]: Started cri-containerd-d0ad14ceaeaf8e709f278e230a0ab23d09c67209a29571c24ba68f8a36c882e5.scope. Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit: BPF prog-id=76 op=LOAD Apr 12 18:42:55.482000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1832 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616431346365616561663865373039663237386532333061306162 Apr 12 18:42:55.482000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.482000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1832 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616431346365616561663865373039663237386532333061306162 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit: BPF prog-id=77 op=LOAD Apr 12 18:42:55.483000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e0030 items=0 ppid=1832 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616431346365616561663865373039663237386532333061306162 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit: BPF prog-id=78 op=LOAD Apr 12 18:42:55.483000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e0078 items=0 ppid=1832 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616431346365616561663865373039663237386532333061306162 Apr 12 18:42:55.483000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:42:55.483000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.483000 audit: BPF prog-id=79 op=LOAD Apr 12 18:42:55.483000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e0488 items=0 ppid=1832 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616431346365616561663865373039663237386532333061306162 Apr 12 18:42:55.490381 env[1160]: time="2024-04-12T18:42:55.489310379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:f4e8212a5db7e0401319814fa9ad65c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"88ecab0dce9f3d7caddf48ed9a1257238c4b0f65734b2ece87c19e4bb1ee98a0\"" Apr 12 18:42:55.491802 env[1160]: time="2024-04-12T18:42:55.491756816Z" level=info msg="CreateContainer within sandbox \"88ecab0dce9f3d7caddf48ed9a1257238c4b0f65734b2ece87c19e4bb1ee98a0\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:42:55.525512 env[1160]: time="2024-04-12T18:42:55.525488050Z" level=info msg="CreateContainer within sandbox \"e58886e8906459b84fe4ad18535f5e3efe993a793a62ac0ac3e54578922bcccb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7620b58d88cff874fae9a88ba19dae226fd56a38ef99d309145b32626ecfeb43\"" Apr 12 18:42:55.525924 env[1160]: time="2024-04-12T18:42:55.525903638Z" level=info msg="StartContainer for \"7620b58d88cff874fae9a88ba19dae226fd56a38ef99d309145b32626ecfeb43\"" Apr 12 18:42:55.531779 env[1160]: time="2024-04-12T18:42:55.531759716Z" level=info msg="StartContainer for \"d0ad14ceaeaf8e709f278e230a0ab23d09c67209a29571c24ba68f8a36c882e5\" returns successfully" Apr 12 18:42:55.535714 systemd[1]: Started cri-containerd-7620b58d88cff874fae9a88ba19dae226fd56a38ef99d309145b32626ecfeb43.scope. Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit: BPF prog-id=80 op=LOAD Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1872 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323062353864383863666638373466616539613838626131396461 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1872 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323062353864383863666638373466616539613838626131396461 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit: BPF prog-id=81 op=LOAD Apr 12 18:42:55.541000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243a0 items=0 ppid=1872 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323062353864383863666638373466616539613838626131396461 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit: BPF prog-id=82 op=LOAD Apr 12 18:42:55.541000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000243e8 items=0 ppid=1872 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323062353864383863666638373466616539613838626131396461 Apr 12 18:42:55.541000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:42:55.541000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.541000 audit: BPF prog-id=83 op=LOAD Apr 12 18:42:55.541000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000247f8 items=0 ppid=1872 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323062353864383863666638373466616539613838626131396461 Apr 12 18:42:55.573511 env[1160]: time="2024-04-12T18:42:55.573482248Z" level=info msg="StartContainer for \"7620b58d88cff874fae9a88ba19dae226fd56a38ef99d309145b32626ecfeb43\" returns successfully" Apr 12 18:42:55.576462 env[1160]: time="2024-04-12T18:42:55.576435370Z" level=info msg="CreateContainer within sandbox \"88ecab0dce9f3d7caddf48ed9a1257238c4b0f65734b2ece87c19e4bb1ee98a0\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ef75d3bad00f5baed40a986e7e18c1e75987b43f337d7daadac65fb708d76427\"" Apr 12 18:42:55.576871 env[1160]: time="2024-04-12T18:42:55.576858851Z" level=info msg="StartContainer for \"ef75d3bad00f5baed40a986e7e18c1e75987b43f337d7daadac65fb708d76427\"" Apr 12 18:42:55.588780 systemd[1]: Started cri-containerd-ef75d3bad00f5baed40a986e7e18c1e75987b43f337d7daadac65fb708d76427.scope. Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.599000 audit: BPF prog-id=84 op=LOAD Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1896 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373564336261643030663562616564343061393836653765313863 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1896 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373564336261643030663562616564343061393836653765313863 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit: BPF prog-id=85 op=LOAD Apr 12 18:42:55.600000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9cb0 items=0 ppid=1896 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373564336261643030663562616564343061393836653765313863 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit: BPF prog-id=86 op=LOAD Apr 12 18:42:55.600000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a9cf8 items=0 ppid=1896 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373564336261643030663562616564343061393836653765313863 Apr 12 18:42:55.600000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:42:55.600000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.600000 audit: BPF prog-id=87 op=LOAD Apr 12 18:42:55.600000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002f4108 items=0 ppid=1896 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566373564336261643030663562616564343061393836653765313863 Apr 12 18:42:55.632379 env[1160]: time="2024-04-12T18:42:55.632311361Z" level=info msg="StartContainer for \"ef75d3bad00f5baed40a986e7e18c1e75987b43f337d7daadac65fb708d76427\" returns successfully" Apr 12 18:42:55.977591 kubelet[1789]: E0412 18:42:55.977531 1789 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:56.199804 systemd[1]: run-containerd-runc-k8s.io-b0b1d721aec7bb1dae2e33bdfea97e581b16573c5729bf74ade4299c6acb3aa6-runc.Wkspj3.mount: Deactivated successfully. Apr 12 18:42:56.244000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:56.244000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00045a000 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:42:56.244000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:56.245000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:56.245000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001ce060 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:42:56.245000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:56.862120 kubelet[1789]: E0412 18:42:56.862090 1789 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="3.2s" Apr 12 18:42:56.968084 kubelet[1789]: I0412 18:42:56.968057 1789 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:42:56.968290 kubelet[1789]: E0412 18:42:56.968278 1789 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Apr 12 18:42:57.783210 kubelet[1789]: W0412 18:42:57.783161 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:57.783210 kubelet[1789]: E0412 18:42:57.783203 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:57.810682 kubelet[1789]: W0412 18:42:57.810645 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:57.810816 kubelet[1789]: E0412 18:42:57.810795 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:57.830981 kubelet[1789]: W0412 18:42:57.830947 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:57.831101 kubelet[1789]: E0412 18:42:57.831091 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:58.086860 kubelet[1789]: W0412 18:42:58.086824 1789 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:58.086989 kubelet[1789]: E0412 18:42:58.086978 1789 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Apr 12 18:42:59.312000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.321971 kernel: kauditd_printk_skb: 623 callbacks suppressed Apr 12 18:42:59.322022 kernel: audit: type=1400 audit(1712947379.312:656): avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.312000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005f2c000 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.333196 kernel: audit: type=1300 audit(1712947379.312:656): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005f2c000 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.333234 kernel: audit: type=1327 audit(1712947379.312:656): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.333258 kernel: audit: type=1400 audit(1712947379.312:657): avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.312000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.312000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0085df2a0 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.342561 kernel: audit: type=1300 audit(1712947379.312:657): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0085df2a0 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.347556 kernel: audit: type=1327 audit(1712947379.312:657): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.312000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.351564 kernel: audit: type=1400 audit(1712947379.312:658): avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.312000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005f2c120 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.364552 kernel: audit: type=1300 audit(1712947379.312:658): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005f2c120 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.340000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.373142 kernel: audit: type=1327 audit(1712947379.312:658): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.373190 kernel: audit: type=1400 audit(1712947379.340:659): avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.340000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c005f2c330 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.357000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.357000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0085dff20 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.357000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.357000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:59.357000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c005d00e40 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:42:59.357000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:42:59.481012 kubelet[1789]: E0412 18:42:59.480987 1789 event.go:346] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.17c59c8f9977847e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-04-12 18:42:53.853344894 +0000 UTC m=+0.286246926,LastTimestamp:2024-04-12 18:42:53.853344894 +0000 UTC m=+0.286246926,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Apr 12 18:42:59.813722 kubelet[1789]: E0412 18:42:59.813646 1789 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:43:00.065342 kubelet[1789]: E0412 18:43:00.065278 1789 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Apr 12 18:43:00.169569 kubelet[1789]: I0412 18:43:00.169553 1789 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:43:00.171001 kubelet[1789]: E0412 18:43:00.170986 1789 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:43:00.182790 kubelet[1789]: I0412 18:43:00.182771 1789 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Apr 12 18:43:00.193369 kubelet[1789]: E0412 18:43:00.193340 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.294362 kubelet[1789]: E0412 18:43:00.294323 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.394969 kubelet[1789]: E0412 18:43:00.394945 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.495562 kubelet[1789]: E0412 18:43:00.495528 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.596364 kubelet[1789]: E0412 18:43:00.596344 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.697066 kubelet[1789]: E0412 18:43:00.696962 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.797723 kubelet[1789]: E0412 18:43:00.797703 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.898707 kubelet[1789]: E0412 18:43:00.898680 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:00.999509 kubelet[1789]: E0412 18:43:00.999439 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:01.099962 kubelet[1789]: E0412 18:43:01.099926 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:01.200409 kubelet[1789]: E0412 18:43:01.200386 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:01.300983 kubelet[1789]: E0412 18:43:01.300903 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:01.401610 kubelet[1789]: E0412 18:43:01.401581 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:01.502090 kubelet[1789]: E0412 18:43:01.502061 1789 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:43:01.857002 kubelet[1789]: I0412 18:43:01.856968 1789 apiserver.go:52] "Watching apiserver" Apr 12 18:43:01.958171 kubelet[1789]: I0412 18:43:01.958138 1789 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:43:02.269573 systemd[1]: Reloading. Apr 12 18:43:02.333454 /usr/lib/systemd/system-generators/torcx-generator[2086]: time="2024-04-12T18:43:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:43:02.333686 /usr/lib/systemd/system-generators/torcx-generator[2086]: time="2024-04-12T18:43:02Z" level=info msg="torcx already run" Apr 12 18:43:02.406049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:43:02.406166 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:43:02.418605 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.471000 audit: BPF prog-id=88 op=LOAD Apr 12 18:43:02.471000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit: BPF prog-id=89 op=LOAD Apr 12 18:43:02.473000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit: BPF prog-id=90 op=LOAD Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit: BPF prog-id=91 op=LOAD Apr 12 18:43:02.474000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:43:02.474000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit: BPF prog-id=92 op=LOAD Apr 12 18:43:02.475000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.476000 audit: BPF prog-id=93 op=LOAD Apr 12 18:43:02.476000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit: BPF prog-id=94 op=LOAD Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.477000 audit: BPF prog-id=95 op=LOAD Apr 12 18:43:02.478000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:43:02.478000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.478000 audit: BPF prog-id=96 op=LOAD Apr 12 18:43:02.479000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit: BPF prog-id=97 op=LOAD Apr 12 18:43:02.480000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.480000 audit: BPF prog-id=98 op=LOAD Apr 12 18:43:02.481000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit: BPF prog-id=99 op=LOAD Apr 12 18:43:02.482000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.482000 audit: BPF prog-id=100 op=LOAD Apr 12 18:43:02.482000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:43:02.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit: BPF prog-id=101 op=LOAD Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.483000 audit: BPF prog-id=102 op=LOAD Apr 12 18:43:02.483000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:43:02.483000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.484000 audit: BPF prog-id=103 op=LOAD Apr 12 18:43:02.484000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit: BPF prog-id=104 op=LOAD Apr 12 18:43:02.486000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit: BPF prog-id=105 op=LOAD Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.486000 audit: BPF prog-id=106 op=LOAD Apr 12 18:43:02.486000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:43:02.486000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.487000 audit: BPF prog-id=107 op=LOAD Apr 12 18:43:02.488000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.488000 audit: BPF prog-id=108 op=LOAD Apr 12 18:43:02.488000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:43:02.500364 systemd[1]: Stopping kubelet.service... Apr 12 18:43:02.512902 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:43:02.513238 systemd[1]: Stopped kubelet.service. Apr 12 18:43:02.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:02.515227 systemd[1]: Started kubelet.service. Apr 12 18:43:02.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:02.606571 kubelet[2145]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:02.606571 kubelet[2145]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:43:02.606571 kubelet[2145]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:02.606812 kubelet[2145]: I0412 18:43:02.606625 2145 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:43:02.614364 kubelet[2145]: I0412 18:43:02.614350 2145 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:43:02.614437 kubelet[2145]: I0412 18:43:02.614429 2145 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:43:02.614661 kubelet[2145]: I0412 18:43:02.614652 2145 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:43:02.616834 kubelet[2145]: I0412 18:43:02.616824 2145 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:43:02.630052 kubelet[2145]: I0412 18:43:02.630036 2145 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:43:02.635193 kubelet[2145]: I0412 18:43:02.635175 2145 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:43:02.635321 kubelet[2145]: I0412 18:43:02.635308 2145 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:43:02.635446 kubelet[2145]: I0412 18:43:02.635430 2145 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:43:02.635508 kubelet[2145]: I0412 18:43:02.635451 2145 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:43:02.635508 kubelet[2145]: I0412 18:43:02.635459 2145 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:43:02.635508 kubelet[2145]: I0412 18:43:02.635483 2145 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:02.635601 kubelet[2145]: I0412 18:43:02.635532 2145 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:43:02.635601 kubelet[2145]: I0412 18:43:02.635599 2145 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:43:02.635640 kubelet[2145]: I0412 18:43:02.635631 2145 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:43:02.635659 kubelet[2145]: I0412 18:43:02.635642 2145 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:43:02.636000 audit[2145]: AVC avc: denied { mac_admin } for pid=2145 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:02.636000 audit[2145]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c34a50 a1=c000c36558 a2=c000c34a20 a3=25 items=0 ppid=1 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:02.636000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:02.636000 audit[2145]: AVC avc: denied { mac_admin } for pid=2145 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:02.636000 audit[2145]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b58d40 a1=c000c36570 a2=c000c34ae0 a3=25 items=0 ppid=1 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:02.636000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:02.637999 kubelet[2145]: I0412 18:43:02.636274 2145 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:43:02.637999 kubelet[2145]: I0412 18:43:02.636371 2145 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:43:02.637999 kubelet[2145]: I0412 18:43:02.636622 2145 server.go:1256] "Started kubelet" Apr 12 18:43:02.637999 kubelet[2145]: I0412 18:43:02.637618 2145 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:43:02.637999 kubelet[2145]: I0412 18:43:02.637644 2145 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:43:02.637999 kubelet[2145]: I0412 18:43:02.637658 2145 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:43:02.640199 kubelet[2145]: I0412 18:43:02.640190 2145 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:43:02.645265 kubelet[2145]: I0412 18:43:02.645233 2145 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:43:02.645567 kubelet[2145]: I0412 18:43:02.645558 2145 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:43:02.649184 kubelet[2145]: I0412 18:43:02.649172 2145 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:43:02.649618 kubelet[2145]: I0412 18:43:02.649580 2145 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:43:02.658711 kubelet[2145]: I0412 18:43:02.658684 2145 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:43:02.660073 kubelet[2145]: I0412 18:43:02.660057 2145 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:43:02.660170 kubelet[2145]: I0412 18:43:02.660153 2145 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:43:02.665131 kubelet[2145]: I0412 18:43:02.662215 2145 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:43:02.665131 kubelet[2145]: I0412 18:43:02.662280 2145 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:43:02.668169 kubelet[2145]: I0412 18:43:02.668155 2145 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:43:02.668258 kubelet[2145]: I0412 18:43:02.668250 2145 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:43:02.668334 kubelet[2145]: I0412 18:43:02.668327 2145 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:43:02.668402 kubelet[2145]: E0412 18:43:02.668395 2145 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:43:02.672802 kubelet[2145]: I0412 18:43:02.672040 2145 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:43:02.710302 kubelet[2145]: I0412 18:43:02.710276 2145 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:43:02.710302 kubelet[2145]: I0412 18:43:02.710297 2145 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:43:02.710456 kubelet[2145]: I0412 18:43:02.710311 2145 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:02.710798 kubelet[2145]: I0412 18:43:02.710785 2145 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:43:02.710834 kubelet[2145]: I0412 18:43:02.710808 2145 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:43:02.710834 kubelet[2145]: I0412 18:43:02.710815 2145 policy_none.go:49] "None policy: Start" Apr 12 18:43:02.711188 kubelet[2145]: I0412 18:43:02.711167 2145 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:43:02.711188 kubelet[2145]: I0412 18:43:02.711186 2145 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:43:02.711591 kubelet[2145]: I0412 18:43:02.711577 2145 state_mem.go:75] "Updated machine memory state" Apr 12 18:43:02.714741 kubelet[2145]: I0412 18:43:02.714721 2145 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:43:02.713000 audit[2145]: AVC avc: denied { mac_admin } for pid=2145 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.713000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:02.713000 audit[2145]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00117e720 a1=c001209140 a2=c00117e6f0 a3=25 items=0 ppid=1 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:02.713000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:02.714979 kubelet[2145]: I0412 18:43:02.714856 2145 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:43:02.715058 kubelet[2145]: I0412 18:43:02.715045 2145 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:43:02.750613 kubelet[2145]: I0412 18:43:02.750593 2145 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:43:02.768397 kubelet[2145]: I0412 18:43:02.768367 2145 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Apr 12 18:43:02.768523 kubelet[2145]: I0412 18:43:02.768426 2145 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Apr 12 18:43:02.768523 kubelet[2145]: I0412 18:43:02.768506 2145 topology_manager.go:215] "Topology Admit Handler" podUID="5d5c5aff921df216fcba2c51c322ceb1" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:43:02.769189 kubelet[2145]: I0412 18:43:02.769163 2145 topology_manager.go:215] "Topology Admit Handler" podUID="82268f61e3b0c50dcf2dc631262cf725" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:43:02.769244 kubelet[2145]: I0412 18:43:02.769204 2145 topology_manager.go:215] "Topology Admit Handler" podUID="f4e8212a5db7e0401319814fa9ad65c9" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:43:02.867251 kubelet[2145]: I0412 18:43:02.867182 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5d5c5aff921df216fcba2c51c322ceb1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5d5c5aff921df216fcba2c51c322ceb1\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:43:02.968134 kubelet[2145]: I0412 18:43:02.968103 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/82268f61e3b0c50dcf2dc631262cf725-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"82268f61e3b0c50dcf2dc631262cf725\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:02.968134 kubelet[2145]: I0412 18:43:02.968141 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:02.968315 kubelet[2145]: I0412 18:43:02.968158 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:02.968315 kubelet[2145]: I0412 18:43:02.968175 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/82268f61e3b0c50dcf2dc631262cf725-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"82268f61e3b0c50dcf2dc631262cf725\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:02.968315 kubelet[2145]: I0412 18:43:02.968191 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/82268f61e3b0c50dcf2dc631262cf725-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"82268f61e3b0c50dcf2dc631262cf725\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:02.968315 kubelet[2145]: I0412 18:43:02.968205 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:02.968315 kubelet[2145]: I0412 18:43:02.968221 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:02.968443 kubelet[2145]: I0412 18:43:02.968237 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:03.636011 kubelet[2145]: I0412 18:43:03.635975 2145 apiserver.go:52] "Watching apiserver" Apr 12 18:43:03.722936 kubelet[2145]: E0412 18:43:03.722910 2145 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:03.760589 kubelet[2145]: I0412 18:43:03.760568 2145 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:43:03.779654 kubelet[2145]: I0412 18:43:03.779631 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.7795714299999998 podStartE2EDuration="1.77957143s" podCreationTimestamp="2024-04-12 18:43:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:03.74620837 +0000 UTC m=+1.194138644" watchObservedRunningTime="2024-04-12 18:43:03.77957143 +0000 UTC m=+1.227501698" Apr 12 18:43:03.779922 kubelet[2145]: I0412 18:43:03.779909 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.779873408 podStartE2EDuration="1.779873408s" podCreationTimestamp="2024-04-12 18:43:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:03.763586201 +0000 UTC m=+1.211516477" watchObservedRunningTime="2024-04-12 18:43:03.779873408 +0000 UTC m=+1.227803683" Apr 12 18:43:03.852145 kubelet[2145]: I0412 18:43:03.852125 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.852100945 podStartE2EDuration="1.852100945s" podCreationTimestamp="2024-04-12 18:43:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:03.838463612 +0000 UTC m=+1.286393886" watchObservedRunningTime="2024-04-12 18:43:03.852100945 +0000 UTC m=+1.300031212" Apr 12 18:43:04.075000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:43:04.075000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000449f40 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:04.075000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:07.104554 sudo[1357]: pam_unix(sudo:session): session closed for user root Apr 12 18:43:07.103000 audit[1357]: USER_END pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:07.105757 kernel: kauditd_printk_skb: 269 callbacks suppressed Apr 12 18:43:07.105796 kernel: audit: type=1106 audit(1712947387.103:912): pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:07.103000 audit[1357]: CRED_DISP pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:07.112104 kernel: audit: type=1104 audit(1712947387.103:913): pid=1357 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:07.119887 sshd[1353]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:07.119000 audit[1353]: USER_END pid=1353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:43:07.121951 systemd[1]: sshd@6-139.178.70.105:22-139.178.89.65:43568.service: Deactivated successfully. Apr 12 18:43:07.122516 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:43:07.122647 systemd[1]: session-9.scope: Consumed 2.359s CPU time. Apr 12 18:43:07.126202 systemd-logind[1143]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:43:07.126655 kernel: audit: type=1106 audit(1712947387.119:914): pid=1353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:43:07.126698 kernel: audit: type=1104 audit(1712947387.119:915): pid=1353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:43:07.119000 audit[1353]: CRED_DISP pid=1353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:43:07.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:43568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:07.133608 kernel: audit: type=1131 audit(1712947387.120:916): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-139.178.89.65:43568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:07.133637 systemd-logind[1143]: Removed session 9. Apr 12 18:43:14.285000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.285000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010cc700 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.294296 kernel: audit: type=1400 audit(1712947394.285:917): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.294401 kernel: audit: type=1300 audit(1712947394.285:917): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010cc700 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.298568 kernel: audit: type=1327 audit(1712947394.285:917): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.285000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.285000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010cc8c0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.306683 kernel: audit: type=1400 audit(1712947394.285:918): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.306776 kernel: audit: type=1300 audit(1712947394.285:918): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010cc8c0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.310446 kernel: audit: type=1327 audit(1712947394.285:918): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.285000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.285000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011c2800 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.318415 kernel: audit: type=1400 audit(1712947394.285:919): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.318510 kernel: audit: type=1300 audit(1712947394.285:919): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011c2800 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.322558 kernel: audit: type=1327 audit(1712947394.285:919): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.285000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:14.285000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011c2840 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:14.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.326564 kernel: audit: type=1400 audit(1712947394.285:920): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:15.416112 kubelet[2145]: I0412 18:43:15.416098 2145 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:43:15.416648 env[1160]: time="2024-04-12T18:43:15.416613792Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:43:15.417047 kubelet[2145]: I0412 18:43:15.417031 2145 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:43:15.936308 kubelet[2145]: I0412 18:43:15.936285 2145 topology_manager.go:215] "Topology Admit Handler" podUID="c843bf71-4238-4677-a560-720e42943a10" podNamespace="kube-system" podName="kube-proxy-fs78w" Apr 12 18:43:15.939178 systemd[1]: Created slice kubepods-besteffort-podc843bf71_4238_4677_a560_720e42943a10.slice. Apr 12 18:43:15.947324 kubelet[2145]: I0412 18:43:15.947308 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c843bf71-4238-4677-a560-720e42943a10-lib-modules\") pod \"kube-proxy-fs78w\" (UID: \"c843bf71-4238-4677-a560-720e42943a10\") " pod="kube-system/kube-proxy-fs78w" Apr 12 18:43:15.947438 kubelet[2145]: I0412 18:43:15.947429 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-57sbn\" (UniqueName: \"kubernetes.io/projected/c843bf71-4238-4677-a560-720e42943a10-kube-api-access-57sbn\") pod \"kube-proxy-fs78w\" (UID: \"c843bf71-4238-4677-a560-720e42943a10\") " pod="kube-system/kube-proxy-fs78w" Apr 12 18:43:15.947500 kubelet[2145]: I0412 18:43:15.947492 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c843bf71-4238-4677-a560-720e42943a10-xtables-lock\") pod \"kube-proxy-fs78w\" (UID: \"c843bf71-4238-4677-a560-720e42943a10\") " pod="kube-system/kube-proxy-fs78w" Apr 12 18:43:15.947581 kubelet[2145]: I0412 18:43:15.947575 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c843bf71-4238-4677-a560-720e42943a10-kube-proxy\") pod \"kube-proxy-fs78w\" (UID: \"c843bf71-4238-4677-a560-720e42943a10\") " pod="kube-system/kube-proxy-fs78w" Apr 12 18:43:16.073210 kubelet[2145]: E0412 18:43:16.073186 2145 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Apr 12 18:43:16.073335 kubelet[2145]: E0412 18:43:16.073327 2145 projected.go:200] Error preparing data for projected volume kube-api-access-57sbn for pod kube-system/kube-proxy-fs78w: configmap "kube-root-ca.crt" not found Apr 12 18:43:16.073447 kubelet[2145]: E0412 18:43:16.073439 2145 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c843bf71-4238-4677-a560-720e42943a10-kube-api-access-57sbn podName:c843bf71-4238-4677-a560-720e42943a10 nodeName:}" failed. No retries permitted until 2024-04-12 18:43:16.573422073 +0000 UTC m=+14.021352341 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-57sbn" (UniqueName: "kubernetes.io/projected/c843bf71-4238-4677-a560-720e42943a10-kube-api-access-57sbn") pod "kube-proxy-fs78w" (UID: "c843bf71-4238-4677-a560-720e42943a10") : configmap "kube-root-ca.crt" not found Apr 12 18:43:16.507611 kubelet[2145]: I0412 18:43:16.507586 2145 topology_manager.go:215] "Topology Admit Handler" podUID="76f2b16b-67bf-4628-a081-b389e65ed695" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-nrxd6" Apr 12 18:43:16.510403 kubelet[2145]: W0412 18:43:16.510381 2145 reflector.go:539] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Apr 12 18:43:16.510403 kubelet[2145]: E0412 18:43:16.510404 2145 reflector.go:147] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Apr 12 18:43:16.510588 kubelet[2145]: W0412 18:43:16.510389 2145 reflector.go:539] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Apr 12 18:43:16.510667 kubelet[2145]: E0412 18:43:16.510656 2145 reflector.go:147] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object Apr 12 18:43:16.511692 systemd[1]: Created slice kubepods-besteffort-pod76f2b16b_67bf_4628_a081_b389e65ed695.slice. Apr 12 18:43:16.550921 kubelet[2145]: I0412 18:43:16.550899 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/76f2b16b-67bf-4628-a081-b389e65ed695-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-nrxd6\" (UID: \"76f2b16b-67bf-4628-a081-b389e65ed695\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-nrxd6" Apr 12 18:43:16.551070 kubelet[2145]: I0412 18:43:16.551060 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v64tx\" (UniqueName: \"kubernetes.io/projected/76f2b16b-67bf-4628-a081-b389e65ed695-kube-api-access-v64tx\") pod \"tigera-operator-6bfc79cb9c-nrxd6\" (UID: \"76f2b16b-67bf-4628-a081-b389e65ed695\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-nrxd6" Apr 12 18:43:16.845162 env[1160]: time="2024-04-12T18:43:16.844754117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fs78w,Uid:c843bf71-4238-4677-a560-720e42943a10,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:16.856252 env[1160]: time="2024-04-12T18:43:16.856205485Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:16.858410 env[1160]: time="2024-04-12T18:43:16.856239534Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:16.858410 env[1160]: time="2024-04-12T18:43:16.856259102Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:16.858410 env[1160]: time="2024-04-12T18:43:16.856377318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9c33508448ea70ae8f41871d59de324af2ec017f6726db77df80de28823a5b8 pid=2224 runtime=io.containerd.runc.v2 Apr 12 18:43:16.872284 systemd[1]: Started cri-containerd-b9c33508448ea70ae8f41871d59de324af2ec017f6726db77df80de28823a5b8.scope. Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.880000 audit: BPF prog-id=109 op=LOAD Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2224 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633333353038343438656137306165386634313837316435396465 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2224 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633333353038343438656137306165386634313837316435396465 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.881000 audit: BPF prog-id=110 op=LOAD Apr 12 18:43:16.881000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00025de90 items=0 ppid=2224 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633333353038343438656137306165386634313837316435396465 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit: BPF prog-id=111 op=LOAD Apr 12 18:43:16.882000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00025ded8 items=0 ppid=2224 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633333353038343438656137306165386634313837316435396465 Apr 12 18:43:16.882000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:43:16.882000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.882000 audit: BPF prog-id=112 op=LOAD Apr 12 18:43:16.882000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002c82e8 items=0 ppid=2224 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633333353038343438656137306165386634313837316435396465 Apr 12 18:43:16.890683 env[1160]: time="2024-04-12T18:43:16.890659339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fs78w,Uid:c843bf71-4238-4677-a560-720e42943a10,Namespace:kube-system,Attempt:0,} returns sandbox id \"b9c33508448ea70ae8f41871d59de324af2ec017f6726db77df80de28823a5b8\"" Apr 12 18:43:16.892516 env[1160]: time="2024-04-12T18:43:16.892500749Z" level=info msg="CreateContainer within sandbox \"b9c33508448ea70ae8f41871d59de324af2ec017f6726db77df80de28823a5b8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:43:16.959560 env[1160]: time="2024-04-12T18:43:16.959515044Z" level=info msg="CreateContainer within sandbox \"b9c33508448ea70ae8f41871d59de324af2ec017f6726db77df80de28823a5b8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bd7c819dbe681a2596d97217b0862850eb54bc3682430d263702329c9e991319\"" Apr 12 18:43:16.960677 env[1160]: time="2024-04-12T18:43:16.960663515Z" level=info msg="StartContainer for \"bd7c819dbe681a2596d97217b0862850eb54bc3682430d263702329c9e991319\"" Apr 12 18:43:16.974071 systemd[1]: Started cri-containerd-bd7c819dbe681a2596d97217b0862850eb54bc3682430d263702329c9e991319.scope. Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f851f2d3cb8 items=0 ppid=2224 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376338313964626536383161323539366439373231376230383632 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit: BPF prog-id=113 op=LOAD Apr 12 18:43:16.989000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bc728 items=0 ppid=2224 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376338313964626536383161323539366439373231376230383632 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit: BPF prog-id=114 op=LOAD Apr 12 18:43:16.989000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bc778 items=0 ppid=2224 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376338313964626536383161323539366439373231376230383632 Apr 12 18:43:16.989000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:43:16.989000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:16.989000 audit: BPF prog-id=115 op=LOAD Apr 12 18:43:16.989000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bc808 items=0 ppid=2224 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:16.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376338313964626536383161323539366439373231376230383632 Apr 12 18:43:17.000003 env[1160]: time="2024-04-12T18:43:16.999970473Z" level=info msg="StartContainer for \"bd7c819dbe681a2596d97217b0862850eb54bc3682430d263702329c9e991319\" returns successfully" Apr 12 18:43:17.655426 systemd[1]: run-containerd-runc-k8s.io-b9c33508448ea70ae8f41871d59de324af2ec017f6726db77df80de28823a5b8-runc.3lI3wH.mount: Deactivated successfully. Apr 12 18:43:17.658020 kubelet[2145]: E0412 18:43:17.657830 2145 projected.go:294] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:43:17.658020 kubelet[2145]: E0412 18:43:17.657851 2145 projected.go:200] Error preparing data for projected volume kube-api-access-v64tx for pod tigera-operator/tigera-operator-6bfc79cb9c-nrxd6: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:43:17.658020 kubelet[2145]: E0412 18:43:17.657893 2145 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/76f2b16b-67bf-4628-a081-b389e65ed695-kube-api-access-v64tx podName:76f2b16b-67bf-4628-a081-b389e65ed695 nodeName:}" failed. No retries permitted until 2024-04-12 18:43:18.157878074 +0000 UTC m=+15.605808344 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-v64tx" (UniqueName: "kubernetes.io/projected/76f2b16b-67bf-4628-a081-b389e65ed695-kube-api-access-v64tx") pod "tigera-operator-6bfc79cb9c-nrxd6" (UID: "76f2b16b-67bf-4628-a081-b389e65ed695") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:43:17.720137 kubelet[2145]: I0412 18:43:17.720115 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-fs78w" podStartSLOduration=2.720090682 podStartE2EDuration="2.720090682s" podCreationTimestamp="2024-04-12 18:43:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:17.719985395 +0000 UTC m=+15.167915669" watchObservedRunningTime="2024-04-12 18:43:17.720090682 +0000 UTC m=+15.168020958" Apr 12 18:43:17.899000 audit[2318]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:17.899000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc9176d40 a2=0 a3=7fffc9176d2c items=0 ppid=2276 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:43:17.900000 audit[2317]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:17.900000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4aa9e530 a2=0 a3=7fff4aa9e51c items=0 ppid=2276 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.900000 audit[2319]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:17.900000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc6fc6020 a2=0 a3=7ffdc6fc600c items=0 ppid=2276 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:43:17.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:43:17.901000 audit[2320]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:17.901000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc76f1d250 a2=0 a3=7ffc76f1d23c items=0 ppid=2276 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:43:17.902000 audit[2321]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:17.902000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeed4927f0 a2=0 a3=7ffeed4927dc items=0 ppid=2276 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:43:17.903000 audit[2322]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:17.903000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcabbd370 a2=0 a3=7ffdcabbd35c items=0 ppid=2276 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:43:18.003000 audit[2323]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.003000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd48ca8e60 a2=0 a3=7ffd48ca8e4c items=0 ppid=2276 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:43:18.008000 audit[2325]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.008000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed81ac460 a2=0 a3=7ffed81ac44c items=0 ppid=2276 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:43:18.011000 audit[2328]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.011000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc096473d0 a2=0 a3=7ffc096473bc items=0 ppid=2276 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:43:18.012000 audit[2329]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.012000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcede47240 a2=0 a3=7ffcede4722c items=0 ppid=2276 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:43:18.013000 audit[2331]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.013000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff83226410 a2=0 a3=7fff832263fc items=0 ppid=2276 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:43:18.014000 audit[2332]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.014000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9a7aae80 a2=0 a3=7ffc9a7aae6c items=0 ppid=2276 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:43:18.016000 audit[2334]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.016000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeae97e420 a2=0 a3=7ffeae97e40c items=0 ppid=2276 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:43:18.019000 audit[2337]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.019000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6dc6aef0 a2=0 a3=7ffe6dc6aedc items=0 ppid=2276 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:43:18.020000 audit[2338]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.020000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5f1c3270 a2=0 a3=7ffd5f1c325c items=0 ppid=2276 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:43:18.022000 audit[2340]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.022000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd301d2720 a2=0 a3=7ffd301d270c items=0 ppid=2276 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:43:18.023000 audit[2341]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.023000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf84ce530 a2=0 a3=7ffcf84ce51c items=0 ppid=2276 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:43:18.025000 audit[2343]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.025000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8062a1a0 a2=0 a3=7ffd8062a18c items=0 ppid=2276 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:18.028000 audit[2346]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.028000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf06d3e40 a2=0 a3=7ffdf06d3e2c items=0 ppid=2276 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:18.031000 audit[2349]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.031000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6fa29e20 a2=0 a3=7ffc6fa29e0c items=0 ppid=2276 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:43:18.032000 audit[2350]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.032000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9ec0b2a0 a2=0 a3=7fff9ec0b28c items=0 ppid=2276 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:43:18.038000 audit[2352]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.038000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff89f7a470 a2=0 a3=7fff89f7a45c items=0 ppid=2276 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:18.040000 audit[2355]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.040000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd53c1ba0 a2=0 a3=7fffd53c1b8c items=0 ppid=2276 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:18.041000 audit[2356]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.041000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce44f4ce0 a2=0 a3=7ffce44f4ccc items=0 ppid=2276 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:43:18.043000 audit[2358]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:18.043000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff5caf9340 a2=0 a3=7fff5caf932c items=0 ppid=2276 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:43:18.129000 audit[2364]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:18.129000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffea9240ed0 a2=0 a3=7ffea9240ebc items=0 ppid=2276 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:18.137000 audit[2364]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:18.137000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffea9240ed0 a2=0 a3=7ffea9240ebc items=0 ppid=2276 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:18.138000 audit[2369]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.138000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdf36a2ff0 a2=0 a3=7ffdf36a2fdc items=0 ppid=2276 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:43:18.140000 audit[2371]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.140000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc11a62d30 a2=0 a3=7ffc11a62d1c items=0 ppid=2276 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:43:18.143000 audit[2374]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.143000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0a505ce0 a2=0 a3=7ffd0a505ccc items=0 ppid=2276 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:43:18.144000 audit[2375]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.144000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8000b6b0 a2=0 a3=7ffe8000b69c items=0 ppid=2276 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:43:18.146000 audit[2377]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.146000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff56e5370 a2=0 a3=7ffff56e535c items=0 ppid=2276 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:43:18.147000 audit[2378]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.147000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe672bf370 a2=0 a3=7ffe672bf35c items=0 ppid=2276 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:43:18.148000 audit[2380]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.148000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc9da8aeb0 a2=0 a3=7ffc9da8ae9c items=0 ppid=2276 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:43:18.151000 audit[2383]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.151000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc60526380 a2=0 a3=7ffc6052636c items=0 ppid=2276 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:43:18.152000 audit[2384]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.152000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd834eb580 a2=0 a3=7ffd834eb56c items=0 ppid=2276 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:43:18.154000 audit[2386]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.154000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2ae91b40 a2=0 a3=7ffc2ae91b2c items=0 ppid=2276 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:43:18.155000 audit[2387]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.155000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5c6408e0 a2=0 a3=7ffc5c6408cc items=0 ppid=2276 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:43:18.157000 audit[2389]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.157000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde5544db0 a2=0 a3=7ffde5544d9c items=0 ppid=2276 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:18.164000 audit[2393]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.164000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb2cf7090 a2=0 a3=7fffb2cf707c items=0 ppid=2276 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.164000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:43:18.167000 audit[2396]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.167000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd899734e0 a2=0 a3=7ffd899734cc items=0 ppid=2276 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:43:18.167000 audit[2397]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.167000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa0dcb610 a2=0 a3=7fffa0dcb5fc items=0 ppid=2276 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:43:18.169000 audit[2399]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.169000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffd4c15920 a2=0 a3=7fffd4c1590c items=0 ppid=2276 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:18.172000 audit[2402]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.172000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd0f694ae0 a2=0 a3=7ffd0f694acc items=0 ppid=2276 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:18.173000 audit[2403]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.173000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee8f36990 a2=0 a3=7ffee8f3697c items=0 ppid=2276 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:43:18.175000 audit[2405]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.175000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdac72ba30 a2=0 a3=7ffdac72ba1c items=0 ppid=2276 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:43:18.176000 audit[2406]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.176000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc81f55e0 a2=0 a3=7ffdc81f55cc items=0 ppid=2276 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:43:18.177000 audit[2408]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.177000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc8422fa0 a2=0 a3=7ffdc8422f8c items=0 ppid=2276 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:18.180000 audit[2411]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:18.180000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffabea1790 a2=0 a3=7fffabea177c items=0 ppid=2276 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:18.182000 audit[2413]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:43:18.182000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc72350410 a2=0 a3=7ffc723503fc items=0 ppid=2276 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.182000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:18.182000 audit[2413]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:43:18.182000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc72350410 a2=0 a3=7ffc723503fc items=0 ppid=2276 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.182000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:18.319106 env[1160]: time="2024-04-12T18:43:18.318799409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-nrxd6,Uid:76f2b16b-67bf-4628-a081-b389e65ed695,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:43:18.350884 env[1160]: time="2024-04-12T18:43:18.350712666Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:18.350884 env[1160]: time="2024-04-12T18:43:18.350881454Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:18.351035 env[1160]: time="2024-04-12T18:43:18.350897180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:18.351252 env[1160]: time="2024-04-12T18:43:18.351217491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/064f745c2b6e27af20145c9961454b9a94ae5a2d83ac476d0b8c3f87016559c9 pid=2420 runtime=io.containerd.runc.v2 Apr 12 18:43:18.368171 systemd[1]: Started cri-containerd-064f745c2b6e27af20145c9961454b9a94ae5a2d83ac476d0b8c3f87016559c9.scope. Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.378000 audit: BPF prog-id=116 op=LOAD Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=2420 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346637343563326236653237616632303134356339393631343534 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=2420 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346637343563326236653237616632303134356339393631343534 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.379000 audit: BPF prog-id=117 op=LOAD Apr 12 18:43:18.379000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c0000a1ab0 items=0 ppid=2420 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346637343563326236653237616632303134356339393631343534 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.380000 audit: BPF prog-id=118 op=LOAD Apr 12 18:43:18.380000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c0000a1af8 items=0 ppid=2420 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346637343563326236653237616632303134356339393631343534 Apr 12 18:43:18.380000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:43:18.380000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:18.381000 audit: BPF prog-id=119 op=LOAD Apr 12 18:43:18.381000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0000a1f08 items=0 ppid=2420 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:18.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346637343563326236653237616632303134356339393631343534 Apr 12 18:43:18.403758 env[1160]: time="2024-04-12T18:43:18.403728913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-nrxd6,Uid:76f2b16b-67bf-4628-a081-b389e65ed695,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"064f745c2b6e27af20145c9961454b9a94ae5a2d83ac476d0b8c3f87016559c9\"" Apr 12 18:43:18.404827 env[1160]: time="2024-04-12T18:43:18.404736630Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:43:18.655019 systemd[1]: run-containerd-runc-k8s.io-064f745c2b6e27af20145c9961454b9a94ae5a2d83ac476d0b8c3f87016559c9-runc.t3b8lX.mount: Deactivated successfully. Apr 12 18:43:19.687954 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3762753312.mount: Deactivated successfully. Apr 12 18:43:20.577175 env[1160]: time="2024-04-12T18:43:20.577146046Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.582556 env[1160]: time="2024-04-12T18:43:20.582527446Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.583614 env[1160]: time="2024-04-12T18:43:20.583602251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.584892 env[1160]: time="2024-04-12T18:43:20.584878585Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.585114 env[1160]: time="2024-04-12T18:43:20.585099182Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:43:20.586603 env[1160]: time="2024-04-12T18:43:20.586588218Z" level=info msg="CreateContainer within sandbox \"064f745c2b6e27af20145c9961454b9a94ae5a2d83ac476d0b8c3f87016559c9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:43:20.592554 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3116335341.mount: Deactivated successfully. Apr 12 18:43:20.613159 env[1160]: time="2024-04-12T18:43:20.613096357Z" level=info msg="CreateContainer within sandbox \"064f745c2b6e27af20145c9961454b9a94ae5a2d83ac476d0b8c3f87016559c9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"605b68299973b555d5cc637c74f6c2e58f1b308471100019bb8cb3621a3337e6\"" Apr 12 18:43:20.613652 env[1160]: time="2024-04-12T18:43:20.613638413Z" level=info msg="StartContainer for \"605b68299973b555d5cc637c74f6c2e58f1b308471100019bb8cb3621a3337e6\"" Apr 12 18:43:20.623811 systemd[1]: Started cri-containerd-605b68299973b555d5cc637c74f6c2e58f1b308471100019bb8cb3621a3337e6.scope. Apr 12 18:43:20.637253 kernel: kauditd_printk_skb: 312 callbacks suppressed Apr 12 18:43:20.637330 kernel: audit: type=1400 audit(1712947400.632:1014): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.642032 kernel: audit: type=1400 audit(1712947400.632:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.642064 kernel: audit: type=1400 audit(1712947400.632:1016): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646789 kernel: audit: type=1400 audit(1712947400.632:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646819 kernel: audit: type=1400 audit(1712947400.632:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.649192 kernel: audit: type=1400 audit(1712947400.632:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.651608 kernel: audit: type=1400 audit(1712947400.632:1020): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.656407 kernel: audit: type=1400 audit(1712947400.632:1021): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.656440 kernel: audit: type=1400 audit(1712947400.632:1022): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.661698 kernel: audit: type=1400 audit(1712947400.639:1023): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit: BPF prog-id=120 op=LOAD Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2420 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356236383239393937336235353564356363363337633734663663 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2420 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356236383239393937336235353564356363363337633734663663 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.639000 audit: BPF prog-id=121 op=LOAD Apr 12 18:43:20.639000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000267700 items=0 ppid=2420 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356236383239393937336235353564356363363337633734663663 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.646000 audit: BPF prog-id=122 op=LOAD Apr 12 18:43:20.646000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000267748 items=0 ppid=2420 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356236383239393937336235353564356363363337633734663663 Apr 12 18:43:20.653000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:43:20.653000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { perfmon } for pid=2460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit[2460]: AVC avc: denied { bpf } for pid=2460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.653000 audit: BPF prog-id=123 op=LOAD Apr 12 18:43:20.653000 audit[2460]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000267b58 items=0 ppid=2420 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356236383239393937336235353564356363363337633734663663 Apr 12 18:43:20.675037 env[1160]: time="2024-04-12T18:43:20.675007299Z" level=info msg="StartContainer for \"605b68299973b555d5cc637c74f6c2e58f1b308471100019bb8cb3621a3337e6\" returns successfully" Apr 12 18:43:20.687571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2525642709.mount: Deactivated successfully. Apr 12 18:43:22.381000 audit[2493]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:22.381000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcea374ec0 a2=0 a3=7ffcea374eac items=0 ppid=2276 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:22.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:22.382000 audit[2493]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:22.382000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcea374ec0 a2=0 a3=0 items=0 ppid=2276 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:22.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:22.392000 audit[2495]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:22.392000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd21a491e0 a2=0 a3=7ffd21a491cc items=0 ppid=2276 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:22.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:22.392000 audit[2495]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:22.392000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd21a491e0 a2=0 a3=0 items=0 ppid=2276 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:22.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:22.552903 kubelet[2145]: I0412 18:43:22.552857 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-nrxd6" podStartSLOduration=4.371576595 podStartE2EDuration="6.552823195s" podCreationTimestamp="2024-04-12 18:43:16 +0000 UTC" firstStartedPulling="2024-04-12 18:43:18.404488104 +0000 UTC m=+15.852418370" lastFinishedPulling="2024-04-12 18:43:20.585734707 +0000 UTC m=+18.033664970" observedRunningTime="2024-04-12 18:43:20.724366035 +0000 UTC m=+18.172296304" watchObservedRunningTime="2024-04-12 18:43:22.552823195 +0000 UTC m=+20.000753477" Apr 12 18:43:22.553250 kubelet[2145]: I0412 18:43:22.553046 2145 topology_manager.go:215] "Topology Admit Handler" podUID="f5f406cf-a18d-4065-bb21-eb537e8abc3b" podNamespace="calico-system" podName="calico-typha-79fb699765-6j7jl" Apr 12 18:43:22.557364 systemd[1]: Created slice kubepods-besteffort-podf5f406cf_a18d_4065_bb21_eb537e8abc3b.slice. Apr 12 18:43:22.561273 kubelet[2145]: W0412 18:43:22.561248 2145 reflector.go:539] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Apr 12 18:43:22.561364 kubelet[2145]: E0412 18:43:22.561288 2145 reflector.go:147] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Apr 12 18:43:22.561364 kubelet[2145]: W0412 18:43:22.561322 2145 reflector.go:539] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Apr 12 18:43:22.561364 kubelet[2145]: E0412 18:43:22.561331 2145 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Apr 12 18:43:22.561490 kubelet[2145]: W0412 18:43:22.561365 2145 reflector.go:539] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Apr 12 18:43:22.561490 kubelet[2145]: E0412 18:43:22.561373 2145 reflector.go:147] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Apr 12 18:43:22.590670 kubelet[2145]: I0412 18:43:22.590647 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s489c\" (UniqueName: \"kubernetes.io/projected/f5f406cf-a18d-4065-bb21-eb537e8abc3b-kube-api-access-s489c\") pod \"calico-typha-79fb699765-6j7jl\" (UID: \"f5f406cf-a18d-4065-bb21-eb537e8abc3b\") " pod="calico-system/calico-typha-79fb699765-6j7jl" Apr 12 18:43:22.590783 kubelet[2145]: I0412 18:43:22.590683 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5f406cf-a18d-4065-bb21-eb537e8abc3b-tigera-ca-bundle\") pod \"calico-typha-79fb699765-6j7jl\" (UID: \"f5f406cf-a18d-4065-bb21-eb537e8abc3b\") " pod="calico-system/calico-typha-79fb699765-6j7jl" Apr 12 18:43:22.590783 kubelet[2145]: I0412 18:43:22.590704 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f5f406cf-a18d-4065-bb21-eb537e8abc3b-typha-certs\") pod \"calico-typha-79fb699765-6j7jl\" (UID: \"f5f406cf-a18d-4065-bb21-eb537e8abc3b\") " pod="calico-system/calico-typha-79fb699765-6j7jl" Apr 12 18:43:22.612716 kubelet[2145]: I0412 18:43:22.612695 2145 topology_manager.go:215] "Topology Admit Handler" podUID="de21b35d-35e9-412e-9f34-8e228aece8df" podNamespace="calico-system" podName="calico-node-7bkj9" Apr 12 18:43:22.616453 systemd[1]: Created slice kubepods-besteffort-podde21b35d_35e9_412e_9f34_8e228aece8df.slice. Apr 12 18:43:22.691592 kubelet[2145]: I0412 18:43:22.690826 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/de21b35d-35e9-412e-9f34-8e228aece8df-node-certs\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.691723 kubelet[2145]: I0412 18:43:22.691714 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-var-run-calico\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.691795 kubelet[2145]: I0412 18:43:22.691788 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-lib-modules\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.691863 kubelet[2145]: I0412 18:43:22.691856 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-policysync\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.691936 kubelet[2145]: I0412 18:43:22.691930 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/de21b35d-35e9-412e-9f34-8e228aece8df-tigera-ca-bundle\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692000 kubelet[2145]: I0412 18:43:22.691988 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-var-lib-calico\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692116 kubelet[2145]: I0412 18:43:22.692109 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-cni-log-dir\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692182 kubelet[2145]: I0412 18:43:22.692176 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-cni-net-dir\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692244 kubelet[2145]: I0412 18:43:22.692231 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-flexvol-driver-host\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692305 kubelet[2145]: I0412 18:43:22.692298 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-xtables-lock\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692386 kubelet[2145]: I0412 18:43:22.692378 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mbb5v\" (UniqueName: \"kubernetes.io/projected/de21b35d-35e9-412e-9f34-8e228aece8df-kube-api-access-mbb5v\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.692450 kubelet[2145]: I0412 18:43:22.692444 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/de21b35d-35e9-412e-9f34-8e228aece8df-cni-bin-dir\") pod \"calico-node-7bkj9\" (UID: \"de21b35d-35e9-412e-9f34-8e228aece8df\") " pod="calico-system/calico-node-7bkj9" Apr 12 18:43:22.724491 kubelet[2145]: I0412 18:43:22.724461 2145 topology_manager.go:215] "Topology Admit Handler" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" podNamespace="calico-system" podName="csi-node-driver-tz7j4" Apr 12 18:43:22.724874 kubelet[2145]: E0412 18:43:22.724860 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:22.793092 kubelet[2145]: I0412 18:43:22.793051 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/27b7d97e-5989-427d-83fb-824c0aaf557b-registration-dir\") pod \"csi-node-driver-tz7j4\" (UID: \"27b7d97e-5989-427d-83fb-824c0aaf557b\") " pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:22.793275 kubelet[2145]: I0412 18:43:22.793119 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/27b7d97e-5989-427d-83fb-824c0aaf557b-socket-dir\") pod \"csi-node-driver-tz7j4\" (UID: \"27b7d97e-5989-427d-83fb-824c0aaf557b\") " pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:22.793275 kubelet[2145]: I0412 18:43:22.793157 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/27b7d97e-5989-427d-83fb-824c0aaf557b-varrun\") pod \"csi-node-driver-tz7j4\" (UID: \"27b7d97e-5989-427d-83fb-824c0aaf557b\") " pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:22.793275 kubelet[2145]: I0412 18:43:22.793191 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2kdbm\" (UniqueName: \"kubernetes.io/projected/27b7d97e-5989-427d-83fb-824c0aaf557b-kube-api-access-2kdbm\") pod \"csi-node-driver-tz7j4\" (UID: \"27b7d97e-5989-427d-83fb-824c0aaf557b\") " pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:22.793275 kubelet[2145]: I0412 18:43:22.793235 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/27b7d97e-5989-427d-83fb-824c0aaf557b-kubelet-dir\") pod \"csi-node-driver-tz7j4\" (UID: \"27b7d97e-5989-427d-83fb-824c0aaf557b\") " pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:22.794282 kubelet[2145]: E0412 18:43:22.794258 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.794282 kubelet[2145]: W0412 18:43:22.794278 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.794403 kubelet[2145]: E0412 18:43:22.794299 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.794403 kubelet[2145]: E0412 18:43:22.794398 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.794403 kubelet[2145]: W0412 18:43:22.794403 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.794483 kubelet[2145]: E0412 18:43:22.794410 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.800472 kubelet[2145]: E0412 18:43:22.800447 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.800718 kubelet[2145]: W0412 18:43:22.800701 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.800792 kubelet[2145]: E0412 18:43:22.800780 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.893872 kubelet[2145]: E0412 18:43:22.893852 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.894003 kubelet[2145]: W0412 18:43:22.893978 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.894076 kubelet[2145]: E0412 18:43:22.894066 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.894291 kubelet[2145]: E0412 18:43:22.894282 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.894355 kubelet[2145]: W0412 18:43:22.894344 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.894425 kubelet[2145]: E0412 18:43:22.894416 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.894606 kubelet[2145]: E0412 18:43:22.894592 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.894669 kubelet[2145]: W0412 18:43:22.894661 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.894725 kubelet[2145]: E0412 18:43:22.894717 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.894913 kubelet[2145]: E0412 18:43:22.894906 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.894969 kubelet[2145]: W0412 18:43:22.894959 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.895027 kubelet[2145]: E0412 18:43:22.895020 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.895209 kubelet[2145]: E0412 18:43:22.895202 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.895277 kubelet[2145]: W0412 18:43:22.895268 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.895340 kubelet[2145]: E0412 18:43:22.895332 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.895511 kubelet[2145]: E0412 18:43:22.895503 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.895610 kubelet[2145]: W0412 18:43:22.895599 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.895675 kubelet[2145]: E0412 18:43:22.895666 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.895830 kubelet[2145]: E0412 18:43:22.895822 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.895887 kubelet[2145]: W0412 18:43:22.895878 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.895943 kubelet[2145]: E0412 18:43:22.895935 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.896088 kubelet[2145]: E0412 18:43:22.896081 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.896134 kubelet[2145]: W0412 18:43:22.896127 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.896191 kubelet[2145]: E0412 18:43:22.896182 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.896329 kubelet[2145]: E0412 18:43:22.896321 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.896379 kubelet[2145]: W0412 18:43:22.896372 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.896451 kubelet[2145]: E0412 18:43:22.896444 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.896639 kubelet[2145]: E0412 18:43:22.896632 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.896697 kubelet[2145]: W0412 18:43:22.896688 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.896752 kubelet[2145]: E0412 18:43:22.896743 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.896889 kubelet[2145]: E0412 18:43:22.896884 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.896936 kubelet[2145]: W0412 18:43:22.896928 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.896981 kubelet[2145]: E0412 18:43:22.896975 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.897132 kubelet[2145]: E0412 18:43:22.897126 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.897177 kubelet[2145]: W0412 18:43:22.897168 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.897230 kubelet[2145]: E0412 18:43:22.897224 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.897366 kubelet[2145]: E0412 18:43:22.897358 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.897431 kubelet[2145]: W0412 18:43:22.897421 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.897494 kubelet[2145]: E0412 18:43:22.897485 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.899695 kubelet[2145]: E0412 18:43:22.899678 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.899816 kubelet[2145]: W0412 18:43:22.899803 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.899885 kubelet[2145]: E0412 18:43:22.899876 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.901147 kubelet[2145]: E0412 18:43:22.901137 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.901223 kubelet[2145]: W0412 18:43:22.901213 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.901286 kubelet[2145]: E0412 18:43:22.901277 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.901459 kubelet[2145]: E0412 18:43:22.901452 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.901514 kubelet[2145]: W0412 18:43:22.901504 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.901591 kubelet[2145]: E0412 18:43:22.901575 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.902805 kubelet[2145]: E0412 18:43:22.902795 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.902868 kubelet[2145]: W0412 18:43:22.902858 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.902934 kubelet[2145]: E0412 18:43:22.902925 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.903115 kubelet[2145]: E0412 18:43:22.903107 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.903169 kubelet[2145]: W0412 18:43:22.903159 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.903233 kubelet[2145]: E0412 18:43:22.903224 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.903369 kubelet[2145]: E0412 18:43:22.903361 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.903415 kubelet[2145]: W0412 18:43:22.903406 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.903472 kubelet[2145]: E0412 18:43:22.903465 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.904677 kubelet[2145]: E0412 18:43:22.904668 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.904750 kubelet[2145]: W0412 18:43:22.904740 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.904805 kubelet[2145]: E0412 18:43:22.904797 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.905005 kubelet[2145]: E0412 18:43:22.904995 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.905071 kubelet[2145]: W0412 18:43:22.905061 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.905129 kubelet[2145]: E0412 18:43:22.905121 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.905330 kubelet[2145]: E0412 18:43:22.905321 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.905387 kubelet[2145]: W0412 18:43:22.905378 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.905440 kubelet[2145]: E0412 18:43:22.905433 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.905645 kubelet[2145]: E0412 18:43:22.905637 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.905713 kubelet[2145]: W0412 18:43:22.905704 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.905772 kubelet[2145]: E0412 18:43:22.905765 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.905933 kubelet[2145]: E0412 18:43:22.905927 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.905984 kubelet[2145]: W0412 18:43:22.905976 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.906037 kubelet[2145]: E0412 18:43:22.906030 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.906189 kubelet[2145]: E0412 18:43:22.906181 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.906249 kubelet[2145]: W0412 18:43:22.906240 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.906305 kubelet[2145]: E0412 18:43:22.906298 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.906456 kubelet[2145]: E0412 18:43:22.906448 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.906513 kubelet[2145]: W0412 18:43:22.906504 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.906577 kubelet[2145]: E0412 18:43:22.906570 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.906761 kubelet[2145]: E0412 18:43:22.906753 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.906820 kubelet[2145]: W0412 18:43:22.906812 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.906879 kubelet[2145]: E0412 18:43:22.906872 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.907142 kubelet[2145]: E0412 18:43:22.907136 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.907196 kubelet[2145]: W0412 18:43:22.907187 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.907251 kubelet[2145]: E0412 18:43:22.907242 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.907430 kubelet[2145]: E0412 18:43:22.907422 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.907486 kubelet[2145]: W0412 18:43:22.907478 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.907569 kubelet[2145]: E0412 18:43:22.907562 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:22.907724 kubelet[2145]: E0412 18:43:22.907717 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:22.907776 kubelet[2145]: W0412 18:43:22.907768 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:22.907840 kubelet[2145]: E0412 18:43:22.907829 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.004371 kubelet[2145]: E0412 18:43:23.004283 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.004371 kubelet[2145]: W0412 18:43:23.004297 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.004371 kubelet[2145]: E0412 18:43:23.004310 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.004526 kubelet[2145]: E0412 18:43:23.004410 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.004526 kubelet[2145]: W0412 18:43:23.004415 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.004526 kubelet[2145]: E0412 18:43:23.004424 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.004715 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.005653 kubelet[2145]: W0412 18:43:23.004724 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.004753 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.004876 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.005653 kubelet[2145]: W0412 18:43:23.004893 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.004904 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.004996 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.005653 kubelet[2145]: W0412 18:43:23.005002 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.005011 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.005653 kubelet[2145]: E0412 18:43:23.005107 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.005945 kubelet[2145]: W0412 18:43:23.005113 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.005945 kubelet[2145]: E0412 18:43:23.005122 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.105400 kubelet[2145]: E0412 18:43:23.105383 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.105520 kubelet[2145]: W0412 18:43:23.105510 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.105591 kubelet[2145]: E0412 18:43:23.105583 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.105742 kubelet[2145]: E0412 18:43:23.105735 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.105791 kubelet[2145]: W0412 18:43:23.105784 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.105842 kubelet[2145]: E0412 18:43:23.105835 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.105984 kubelet[2145]: E0412 18:43:23.105978 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.106037 kubelet[2145]: W0412 18:43:23.106029 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.106093 kubelet[2145]: E0412 18:43:23.106086 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.106792 kubelet[2145]: E0412 18:43:23.106782 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.106855 kubelet[2145]: W0412 18:43:23.106845 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.106938 kubelet[2145]: E0412 18:43:23.106928 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.107584 kubelet[2145]: E0412 18:43:23.107576 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.107652 kubelet[2145]: W0412 18:43:23.107642 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.107716 kubelet[2145]: E0412 18:43:23.107708 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.108098 kubelet[2145]: E0412 18:43:23.108089 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.108159 kubelet[2145]: W0412 18:43:23.108149 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.108215 kubelet[2145]: E0412 18:43:23.108208 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.209275 kubelet[2145]: E0412 18:43:23.209258 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.209379 kubelet[2145]: W0412 18:43:23.209368 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.209449 kubelet[2145]: E0412 18:43:23.209440 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.209643 kubelet[2145]: E0412 18:43:23.209636 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.209743 kubelet[2145]: W0412 18:43:23.209702 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.209793 kubelet[2145]: E0412 18:43:23.209785 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.210010 kubelet[2145]: E0412 18:43:23.210003 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.210061 kubelet[2145]: W0412 18:43:23.210053 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.210111 kubelet[2145]: E0412 18:43:23.210103 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.210259 kubelet[2145]: E0412 18:43:23.210253 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.210305 kubelet[2145]: W0412 18:43:23.210297 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.210350 kubelet[2145]: E0412 18:43:23.210343 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.210518 kubelet[2145]: E0412 18:43:23.210510 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.210591 kubelet[2145]: W0412 18:43:23.210581 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.210682 kubelet[2145]: E0412 18:43:23.210674 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.210895 kubelet[2145]: E0412 18:43:23.210887 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.210946 kubelet[2145]: W0412 18:43:23.210939 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.211000 kubelet[2145]: E0412 18:43:23.210992 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.312579 kubelet[2145]: E0412 18:43:23.312444 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.312579 kubelet[2145]: W0412 18:43:23.312462 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.312579 kubelet[2145]: E0412 18:43:23.312480 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.312778 kubelet[2145]: E0412 18:43:23.312666 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.312778 kubelet[2145]: W0412 18:43:23.312671 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.312778 kubelet[2145]: E0412 18:43:23.312678 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.312778 kubelet[2145]: E0412 18:43:23.312772 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.312778 kubelet[2145]: W0412 18:43:23.312778 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.312933 kubelet[2145]: E0412 18:43:23.312785 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.312933 kubelet[2145]: E0412 18:43:23.312858 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.312933 kubelet[2145]: W0412 18:43:23.312862 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.312933 kubelet[2145]: E0412 18:43:23.312868 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.313049 kubelet[2145]: E0412 18:43:23.312940 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.313049 kubelet[2145]: W0412 18:43:23.312944 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.313049 kubelet[2145]: E0412 18:43:23.312950 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.313049 kubelet[2145]: E0412 18:43:23.313032 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.313049 kubelet[2145]: W0412 18:43:23.313036 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.313049 kubelet[2145]: E0412 18:43:23.313042 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.401000 audit[2555]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:23.401000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee4972f40 a2=0 a3=7ffee4972f2c items=0 ppid=2276 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:23.402000 audit[2555]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:23.402000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee4972f40 a2=0 a3=0 items=0 ppid=2276 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:23.414228 kubelet[2145]: E0412 18:43:23.414196 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.414427 kubelet[2145]: W0412 18:43:23.414411 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.414526 kubelet[2145]: E0412 18:43:23.414516 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.414743 kubelet[2145]: E0412 18:43:23.414736 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.414799 kubelet[2145]: W0412 18:43:23.414791 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.414849 kubelet[2145]: E0412 18:43:23.414842 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.415020 kubelet[2145]: E0412 18:43:23.415014 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.415068 kubelet[2145]: W0412 18:43:23.415060 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.415115 kubelet[2145]: E0412 18:43:23.415108 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.415399 kubelet[2145]: E0412 18:43:23.415392 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.415450 kubelet[2145]: W0412 18:43:23.415441 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.415509 kubelet[2145]: E0412 18:43:23.415501 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.415687 kubelet[2145]: E0412 18:43:23.415681 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.415738 kubelet[2145]: W0412 18:43:23.415730 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.415789 kubelet[2145]: E0412 18:43:23.415781 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.415937 kubelet[2145]: E0412 18:43:23.415931 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.415998 kubelet[2145]: W0412 18:43:23.415989 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.416716 kubelet[2145]: E0412 18:43:23.416706 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.423746 kubelet[2145]: E0412 18:43:23.423715 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.423927 kubelet[2145]: W0412 18:43:23.423912 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.424000 kubelet[2145]: E0412 18:43:23.423990 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.424685 kubelet[2145]: E0412 18:43:23.424677 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.424744 kubelet[2145]: W0412 18:43:23.424735 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.424793 kubelet[2145]: E0412 18:43:23.424786 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.501967 kubelet[2145]: E0412 18:43:23.501954 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.502056 kubelet[2145]: W0412 18:43:23.502045 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.502109 kubelet[2145]: E0412 18:43:23.502101 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.502387 kubelet[2145]: E0412 18:43:23.502380 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.502444 kubelet[2145]: W0412 18:43:23.502436 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.502491 kubelet[2145]: E0412 18:43:23.502483 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.506008 kubelet[2145]: E0412 18:43:23.505995 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.506092 kubelet[2145]: W0412 18:43:23.506082 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.506142 kubelet[2145]: E0412 18:43:23.506134 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.517280 kubelet[2145]: E0412 18:43:23.517265 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.517380 kubelet[2145]: W0412 18:43:23.517370 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.517433 kubelet[2145]: E0412 18:43:23.517424 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.518904 env[1160]: time="2024-04-12T18:43:23.518622736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7bkj9,Uid:de21b35d-35e9-412e-9f34-8e228aece8df,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:23.544114 env[1160]: time="2024-04-12T18:43:23.544066011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:23.544240 env[1160]: time="2024-04-12T18:43:23.544096013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:23.544240 env[1160]: time="2024-04-12T18:43:23.544119215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:23.544517 env[1160]: time="2024-04-12T18:43:23.544450836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb pid=2579 runtime=io.containerd.runc.v2 Apr 12 18:43:23.558108 systemd[1]: Started cri-containerd-0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb.scope. Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit: BPF prog-id=124 op=LOAD Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383462623836646630643461333263333139616438306264643632 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383462623836646630643461333263333139616438306264643632 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit: BPF prog-id=125 op=LOAD Apr 12 18:43:23.574000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035c0a0 items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383462623836646630643461333263333139616438306264643632 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit: BPF prog-id=126 op=LOAD Apr 12 18:43:23.574000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035c0e8 items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383462623836646630643461333263333139616438306264643632 Apr 12 18:43:23.574000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:43:23.574000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.574000 audit: BPF prog-id=127 op=LOAD Apr 12 18:43:23.574000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035c4f8 items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383462623836646630643461333263333139616438306264643632 Apr 12 18:43:23.585417 env[1160]: time="2024-04-12T18:43:23.585378793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7bkj9,Uid:de21b35d-35e9-412e-9f34-8e228aece8df,Namespace:calico-system,Attempt:0,} returns sandbox id \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\"" Apr 12 18:43:23.587095 env[1160]: time="2024-04-12T18:43:23.587075461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:43:23.618021 kubelet[2145]: E0412 18:43:23.618000 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.618021 kubelet[2145]: W0412 18:43:23.618014 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.618021 kubelet[2145]: E0412 18:43:23.618027 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.692258 kubelet[2145]: E0412 18:43:23.692236 2145 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Apr 12 18:43:23.692354 kubelet[2145]: E0412 18:43:23.692280 2145 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f5f406cf-a18d-4065-bb21-eb537e8abc3b-typha-certs podName:f5f406cf-a18d-4065-bb21-eb537e8abc3b nodeName:}" failed. No retries permitted until 2024-04-12 18:43:24.192268499 +0000 UTC m=+21.640198764 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/f5f406cf-a18d-4065-bb21-eb537e8abc3b-typha-certs") pod "calico-typha-79fb699765-6j7jl" (UID: "f5f406cf-a18d-4065-bb21-eb537e8abc3b") : failed to sync secret cache: timed out waiting for the condition Apr 12 18:43:23.718580 kubelet[2145]: E0412 18:43:23.718553 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.718580 kubelet[2145]: W0412 18:43:23.718574 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.718715 kubelet[2145]: E0412 18:43:23.718593 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.819076 kubelet[2145]: E0412 18:43:23.819048 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.819076 kubelet[2145]: W0412 18:43:23.819066 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.819076 kubelet[2145]: E0412 18:43:23.819079 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:23.920025 kubelet[2145]: E0412 18:43:23.919954 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:23.920025 kubelet[2145]: W0412 18:43:23.919968 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:23.920025 kubelet[2145]: E0412 18:43:23.919983 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.020817 kubelet[2145]: E0412 18:43:24.020797 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.020817 kubelet[2145]: W0412 18:43:24.020810 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.020933 kubelet[2145]: E0412 18:43:24.020825 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.121574 kubelet[2145]: E0412 18:43:24.121551 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.121574 kubelet[2145]: W0412 18:43:24.121565 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.121574 kubelet[2145]: E0412 18:43:24.121581 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.222790 kubelet[2145]: E0412 18:43:24.222647 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.222790 kubelet[2145]: W0412 18:43:24.222671 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.222790 kubelet[2145]: E0412 18:43:24.222689 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.222941 kubelet[2145]: E0412 18:43:24.222892 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.222941 kubelet[2145]: W0412 18:43:24.222899 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.222941 kubelet[2145]: E0412 18:43:24.222910 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.223058 kubelet[2145]: E0412 18:43:24.223045 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.223058 kubelet[2145]: W0412 18:43:24.223054 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.223134 kubelet[2145]: E0412 18:43:24.223065 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.223523 kubelet[2145]: E0412 18:43:24.223189 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.223523 kubelet[2145]: W0412 18:43:24.223203 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.223523 kubelet[2145]: E0412 18:43:24.223216 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.223523 kubelet[2145]: E0412 18:43:24.223338 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.223523 kubelet[2145]: W0412 18:43:24.223344 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.223523 kubelet[2145]: E0412 18:43:24.223353 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.228612 kubelet[2145]: E0412 18:43:24.228566 2145 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:24.228612 kubelet[2145]: W0412 18:43:24.228581 2145 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:24.228612 kubelet[2145]: E0412 18:43:24.228598 2145 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:24.370458 env[1160]: time="2024-04-12T18:43:24.370407169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79fb699765-6j7jl,Uid:f5f406cf-a18d-4065-bb21-eb537e8abc3b,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:24.382806 env[1160]: time="2024-04-12T18:43:24.382740006Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:24.382892 env[1160]: time="2024-04-12T18:43:24.382826438Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:24.382892 env[1160]: time="2024-04-12T18:43:24.382856819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:24.383111 env[1160]: time="2024-04-12T18:43:24.383089169Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef7a6fbccf9033befc6a450d29875e5df768159e3ff579f6e4feb86461388444 pid=2636 runtime=io.containerd.runc.v2 Apr 12 18:43:24.395488 systemd[1]: Started cri-containerd-ef7a6fbccf9033befc6a450d29875e5df768159e3ff579f6e4feb86461388444.scope. Apr 12 18:43:24.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit: BPF prog-id=128 op=LOAD Apr 12 18:43:24.404000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376136666263636639303333626566633661343530643239383735 Apr 12 18:43:24.404000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.404000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376136666263636639303333626566633661343530643239383735 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit: BPF prog-id=129 op=LOAD Apr 12 18:43:24.405000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292360 items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376136666263636639303333626566633661343530643239383735 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.405000 audit: BPF prog-id=130 op=LOAD Apr 12 18:43:24.405000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002923a8 items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376136666263636639303333626566633661343530643239383735 Apr 12 18:43:24.405000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:43:24.406000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.406000 audit: BPF prog-id=131 op=LOAD Apr 12 18:43:24.406000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002927b8 items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376136666263636639303333626566633661343530643239383735 Apr 12 18:43:24.477095 env[1160]: time="2024-04-12T18:43:24.477025124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79fb699765-6j7jl,Uid:f5f406cf-a18d-4065-bb21-eb537e8abc3b,Namespace:calico-system,Attempt:0,} returns sandbox id \"ef7a6fbccf9033befc6a450d29875e5df768159e3ff579f6e4feb86461388444\"" Apr 12 18:43:24.670355 kubelet[2145]: E0412 18:43:24.669910 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:24.797892 systemd[1]: run-containerd-runc-k8s.io-ef7a6fbccf9033befc6a450d29875e5df768159e3ff579f6e4feb86461388444-runc.c2HN4R.mount: Deactivated successfully. Apr 12 18:43:24.900896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2671015324.mount: Deactivated successfully. Apr 12 18:43:25.797762 env[1160]: time="2024-04-12T18:43:25.797729908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:25.799287 env[1160]: time="2024-04-12T18:43:25.799271281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:25.800356 env[1160]: time="2024-04-12T18:43:25.800341412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:25.801673 env[1160]: time="2024-04-12T18:43:25.801658482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:25.802219 env[1160]: time="2024-04-12T18:43:25.802198400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:43:25.803054 env[1160]: time="2024-04-12T18:43:25.803033173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:43:25.804977 env[1160]: time="2024-04-12T18:43:25.804927958Z" level=info msg="CreateContainer within sandbox \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:43:25.811870 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3865805763.mount: Deactivated successfully. Apr 12 18:43:25.825216 env[1160]: time="2024-04-12T18:43:25.825192828Z" level=info msg="CreateContainer within sandbox \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905\"" Apr 12 18:43:25.826339 env[1160]: time="2024-04-12T18:43:25.825697339Z" level=info msg="StartContainer for \"a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905\"" Apr 12 18:43:25.840482 systemd[1]: Started cri-containerd-a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905.scope. Apr 12 18:43:25.856301 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:43:25.856369 kernel: audit: type=1400 audit(1712947405.851:1074): avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.851000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.862570 kernel: audit: type=1300 audit(1712947405.851:1074): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f797edc7db8 items=0 ppid=2579 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.862645 kernel: audit: type=1327 audit(1712947405.851:1074): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323137393364356333326434386363353734643934383033666331 Apr 12 18:43:25.851000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f797edc7db8 items=0 ppid=2579 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323137393364356333326434386363353734643934383033666331 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.877568 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.880556 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.886497 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.886576 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.891587 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.891621 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.891633 kernel: audit: type=1400 audit(1712947405.858:1075): avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.858000 audit: BPF prog-id=132 op=LOAD Apr 12 18:43:25.858000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003209a8 items=0 ppid=2579 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323137393364356333326434386363353734643934383033666331 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit: BPF prog-id=133 op=LOAD Apr 12 18:43:25.860000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003209f8 items=0 ppid=2579 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323137393364356333326434386363353734643934383033666331 Apr 12 18:43:25.860000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:43:25.860000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:25.860000 audit: BPF prog-id=134 op=LOAD Apr 12 18:43:25.860000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000320a88 items=0 ppid=2579 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323137393364356333326434386363353734643934383033666331 Apr 12 18:43:25.894891 env[1160]: time="2024-04-12T18:43:25.894676317Z" level=info msg="StartContainer for \"a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905\" returns successfully" Apr 12 18:43:25.899458 systemd[1]: cri-containerd-a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905.scope: Deactivated successfully. Apr 12 18:43:25.902000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:43:26.310425 env[1160]: time="2024-04-12T18:43:26.310390400Z" level=info msg="shim disconnected" id=a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905 Apr 12 18:43:26.310649 env[1160]: time="2024-04-12T18:43:26.310633764Z" level=warning msg="cleaning up after shim disconnected" id=a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905 namespace=k8s.io Apr 12 18:43:26.310728 env[1160]: time="2024-04-12T18:43:26.310714812Z" level=info msg="cleaning up dead shim" Apr 12 18:43:26.320825 env[1160]: time="2024-04-12T18:43:26.320795020Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:43:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2717 runtime=io.containerd.runc.v2\n" Apr 12 18:43:26.670422 kubelet[2145]: E0412 18:43:26.670226 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:26.809314 systemd[1]: run-containerd-runc-k8s.io-a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905-runc.559K1s.mount: Deactivated successfully. Apr 12 18:43:26.809399 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a921793d5c32d48cc574d94803fc1902471f17b2bb3f6810edfefe978e9a5905-rootfs.mount: Deactivated successfully. Apr 12 18:43:27.017762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2980194799.mount: Deactivated successfully. Apr 12 18:43:28.158892 env[1160]: time="2024-04-12T18:43:28.158861065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.159738 env[1160]: time="2024-04-12T18:43:28.159718547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.161550 env[1160]: time="2024-04-12T18:43:28.161514212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.162554 env[1160]: time="2024-04-12T18:43:28.162527311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.163089 env[1160]: time="2024-04-12T18:43:28.163073281Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:43:28.163903 env[1160]: time="2024-04-12T18:43:28.163888669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:43:28.171609 env[1160]: time="2024-04-12T18:43:28.171586168Z" level=info msg="CreateContainer within sandbox \"ef7a6fbccf9033befc6a450d29875e5df768159e3ff579f6e4feb86461388444\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:43:28.192132 env[1160]: time="2024-04-12T18:43:28.192108142Z" level=info msg="CreateContainer within sandbox \"ef7a6fbccf9033befc6a450d29875e5df768159e3ff579f6e4feb86461388444\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a8f17cffce7122ea938320ee59364282f363fb83aff246205cf106a957a467d5\"" Apr 12 18:43:28.193360 env[1160]: time="2024-04-12T18:43:28.193341993Z" level=info msg="StartContainer for \"a8f17cffce7122ea938320ee59364282f363fb83aff246205cf106a957a467d5\"" Apr 12 18:43:28.208365 systemd[1]: Started cri-containerd-a8f17cffce7122ea938320ee59364282f363fb83aff246205cf106a957a467d5.scope. Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.219000 audit: BPF prog-id=135 op=LOAD Apr 12 18:43:28.220000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.220000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2636 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663137636666636537313232656139333833323065653539333634 Apr 12 18:43:28.220000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.220000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2636 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663137636666636537313232656139333833323065653539333634 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit: BPF prog-id=136 op=LOAD Apr 12 18:43:28.221000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000265a30 items=0 ppid=2636 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663137636666636537313232656139333833323065653539333634 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit: BPF prog-id=137 op=LOAD Apr 12 18:43:28.221000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000265a78 items=0 ppid=2636 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663137636666636537313232656139333833323065653539333634 Apr 12 18:43:28.221000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:43:28.221000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.221000 audit: BPF prog-id=138 op=LOAD Apr 12 18:43:28.221000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000265e88 items=0 ppid=2636 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663137636666636537313232656139333833323065653539333634 Apr 12 18:43:28.243224 env[1160]: time="2024-04-12T18:43:28.243179678Z" level=info msg="StartContainer for \"a8f17cffce7122ea938320ee59364282f363fb83aff246205cf106a957a467d5\" returns successfully" Apr 12 18:43:28.669898 kubelet[2145]: E0412 18:43:28.669694 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:28.738911 kubelet[2145]: I0412 18:43:28.738883 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-79fb699765-6j7jl" podStartSLOduration=3.055236846 podStartE2EDuration="6.738857513s" podCreationTimestamp="2024-04-12 18:43:22 +0000 UTC" firstStartedPulling="2024-04-12 18:43:24.479701114 +0000 UTC m=+21.927631376" lastFinishedPulling="2024-04-12 18:43:28.163321777 +0000 UTC m=+25.611252043" observedRunningTime="2024-04-12 18:43:28.738678687 +0000 UTC m=+26.186608956" watchObservedRunningTime="2024-04-12 18:43:28.738857513 +0000 UTC m=+26.186787782" Apr 12 18:43:29.326546 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3830771871.mount: Deactivated successfully. Apr 12 18:43:29.748797 kubelet[2145]: I0412 18:43:29.748282 2145 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:43:30.669906 kubelet[2145]: E0412 18:43:30.669873 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:32.007626 env[1160]: time="2024-04-12T18:43:32.007584018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:32.008514 env[1160]: time="2024-04-12T18:43:32.008492295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:32.009554 env[1160]: time="2024-04-12T18:43:32.009529325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:32.010565 env[1160]: time="2024-04-12T18:43:32.010536457Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:32.011061 env[1160]: time="2024-04-12T18:43:32.011043382Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:43:32.013593 env[1160]: time="2024-04-12T18:43:32.013568640Z" level=info msg="CreateContainer within sandbox \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:43:32.022802 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount452708722.mount: Deactivated successfully. Apr 12 18:43:32.064695 env[1160]: time="2024-04-12T18:43:32.064656686Z" level=info msg="CreateContainer within sandbox \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac\"" Apr 12 18:43:32.066567 env[1160]: time="2024-04-12T18:43:32.065150378Z" level=info msg="StartContainer for \"60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac\"" Apr 12 18:43:32.092822 systemd[1]: Started cri-containerd-60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac.scope. Apr 12 18:43:32.117627 kernel: kauditd_printk_skb: 91 callbacks suppressed Apr 12 18:43:32.117726 kernel: audit: type=1400 audit(1712947412.113:1099): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.121741 kernel: audit: type=1300 audit(1712947412.113:1099): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f58a2413f58 items=0 ppid=2579 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:32.113000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f58a2413f58 items=0 ppid=2579 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:32.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666662633361303263303139633036353739346139613266383334 Apr 12 18:43:32.128985 kernel: audit: type=1327 audit(1712947412.113:1099): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666662633361303263303139633036353739346139613266383334 Apr 12 18:43:32.129074 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.131750 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.137617 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.137723 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.137753 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.143580 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.149582 kernel: audit: type=1400 audit(1712947412.113:1100): avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit: BPF prog-id=139 op=LOAD Apr 12 18:43:32.113000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00035e6d8 items=0 ppid=2579 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:32.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666662633361303263303139633036353739346139613266383334 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit: BPF prog-id=140 op=LOAD Apr 12 18:43:32.113000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00035e728 items=0 ppid=2579 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:32.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666662633361303263303139633036353739346139613266383334 Apr 12 18:43:32.113000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:43:32.113000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:32.113000 audit: BPF prog-id=141 op=LOAD Apr 12 18:43:32.113000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00035e7b8 items=0 ppid=2579 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:32.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630666662633361303263303139633036353739346139613266383334 Apr 12 18:43:32.169402 env[1160]: time="2024-04-12T18:43:32.169374088Z" level=info msg="StartContainer for \"60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac\" returns successfully" Apr 12 18:43:32.670079 kubelet[2145]: E0412 18:43:32.669893 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:33.021408 systemd[1]: run-containerd-runc-k8s.io-60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac-runc.fki5wi.mount: Deactivated successfully. Apr 12 18:43:33.435972 env[1160]: time="2024-04-12T18:43:33.435917329Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:43:33.437709 systemd[1]: cri-containerd-60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac.scope: Deactivated successfully. Apr 12 18:43:33.441000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:43:33.449474 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac-rootfs.mount: Deactivated successfully. Apr 12 18:43:33.476018 kubelet[2145]: I0412 18:43:33.475995 2145 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:43:33.598746 kubelet[2145]: I0412 18:43:33.598718 2145 topology_manager.go:215] "Topology Admit Handler" podUID="4a8d6a00-5e14-44e4-ac13-3b10d879597b" podNamespace="kube-system" podName="coredns-76f75df574-sdm9s" Apr 12 18:43:33.599336 kubelet[2145]: I0412 18:43:33.599319 2145 topology_manager.go:215] "Topology Admit Handler" podUID="47287052-b669-47a1-b443-c190dc2a920a" podNamespace="calico-system" podName="calico-kube-controllers-6b689475f8-rtdhx" Apr 12 18:43:33.599660 kubelet[2145]: I0412 18:43:33.599648 2145 topology_manager.go:215] "Topology Admit Handler" podUID="80613424-34c1-468f-ad23-dca75b8ce3ac" podNamespace="kube-system" podName="coredns-76f75df574-bzmbp" Apr 12 18:43:33.601007 kubelet[2145]: W0412 18:43:33.600992 2145 reflector.go:539] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object Apr 12 18:43:33.601007 kubelet[2145]: E0412 18:43:33.601011 2145 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object Apr 12 18:43:33.603672 systemd[1]: Created slice kubepods-burstable-pod4a8d6a00_5e14_44e4_ac13_3b10d879597b.slice. Apr 12 18:43:33.606853 systemd[1]: Created slice kubepods-besteffort-pod47287052_b669_47a1_b443_c190dc2a920a.slice. Apr 12 18:43:33.610438 systemd[1]: Created slice kubepods-burstable-pod80613424_34c1_468f_ad23_dca75b8ce3ac.slice. Apr 12 18:43:33.685927 kubelet[2145]: I0412 18:43:33.685906 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fqs78\" (UniqueName: \"kubernetes.io/projected/47287052-b669-47a1-b443-c190dc2a920a-kube-api-access-fqs78\") pod \"calico-kube-controllers-6b689475f8-rtdhx\" (UID: \"47287052-b669-47a1-b443-c190dc2a920a\") " pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" Apr 12 18:43:33.686267 kubelet[2145]: I0412 18:43:33.686228 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ld4sr\" (UniqueName: \"kubernetes.io/projected/80613424-34c1-468f-ad23-dca75b8ce3ac-kube-api-access-ld4sr\") pod \"coredns-76f75df574-bzmbp\" (UID: \"80613424-34c1-468f-ad23-dca75b8ce3ac\") " pod="kube-system/coredns-76f75df574-bzmbp" Apr 12 18:43:33.686342 kubelet[2145]: I0412 18:43:33.686333 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pdk26\" (UniqueName: \"kubernetes.io/projected/4a8d6a00-5e14-44e4-ac13-3b10d879597b-kube-api-access-pdk26\") pod \"coredns-76f75df574-sdm9s\" (UID: \"4a8d6a00-5e14-44e4-ac13-3b10d879597b\") " pod="kube-system/coredns-76f75df574-sdm9s" Apr 12 18:43:33.686403 kubelet[2145]: I0412 18:43:33.686396 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4a8d6a00-5e14-44e4-ac13-3b10d879597b-config-volume\") pod \"coredns-76f75df574-sdm9s\" (UID: \"4a8d6a00-5e14-44e4-ac13-3b10d879597b\") " pod="kube-system/coredns-76f75df574-sdm9s" Apr 12 18:43:33.686506 kubelet[2145]: I0412 18:43:33.686497 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/80613424-34c1-468f-ad23-dca75b8ce3ac-config-volume\") pod \"coredns-76f75df574-bzmbp\" (UID: \"80613424-34c1-468f-ad23-dca75b8ce3ac\") " pod="kube-system/coredns-76f75df574-bzmbp" Apr 12 18:43:33.686583 kubelet[2145]: I0412 18:43:33.686576 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/47287052-b669-47a1-b443-c190dc2a920a-tigera-ca-bundle\") pod \"calico-kube-controllers-6b689475f8-rtdhx\" (UID: \"47287052-b669-47a1-b443-c190dc2a920a\") " pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" Apr 12 18:43:33.740324 env[1160]: time="2024-04-12T18:43:33.740271915Z" level=info msg="shim disconnected" id=60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac Apr 12 18:43:33.740469 env[1160]: time="2024-04-12T18:43:33.740455216Z" level=warning msg="cleaning up after shim disconnected" id=60ffbc3a02c019c065794a9a2f83494ac4fd06d9e9b7c16b25f25a7bced997ac namespace=k8s.io Apr 12 18:43:33.740525 env[1160]: time="2024-04-12T18:43:33.740513275Z" level=info msg="cleaning up dead shim" Apr 12 18:43:33.746068 env[1160]: time="2024-04-12T18:43:33.746035500Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:43:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2819 runtime=io.containerd.runc.v2\n" Apr 12 18:43:33.755402 env[1160]: time="2024-04-12T18:43:33.755377382Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:43:33.909531 env[1160]: time="2024-04-12T18:43:33.909204634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b689475f8-rtdhx,Uid:47287052-b669-47a1-b443-c190dc2a920a,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:34.112700 env[1160]: time="2024-04-12T18:43:34.112648370Z" level=error msg="Failed to destroy network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.113988 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576-shm.mount: Deactivated successfully. Apr 12 18:43:34.115392 env[1160]: time="2024-04-12T18:43:34.115365531Z" level=error msg="encountered an error cleaning up failed sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.115488 env[1160]: time="2024-04-12T18:43:34.115470877Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b689475f8-rtdhx,Uid:47287052-b669-47a1-b443-c190dc2a920a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.118731 kubelet[2145]: E0412 18:43:34.118710 2145 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.118791 kubelet[2145]: E0412 18:43:34.118754 2145 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" Apr 12 18:43:34.118791 kubelet[2145]: E0412 18:43:34.118769 2145 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" Apr 12 18:43:34.118839 kubelet[2145]: E0412 18:43:34.118808 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6b689475f8-rtdhx_calico-system(47287052-b669-47a1-b443-c190dc2a920a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6b689475f8-rtdhx_calico-system(47287052-b669-47a1-b443-c190dc2a920a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" podUID="47287052-b669-47a1-b443-c190dc2a920a" Apr 12 18:43:34.673905 systemd[1]: Created slice kubepods-besteffort-pod27b7d97e_5989_427d_83fb_824c0aaf557b.slice. Apr 12 18:43:34.675471 env[1160]: time="2024-04-12T18:43:34.675449511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tz7j4,Uid:27b7d97e-5989-427d-83fb-824c0aaf557b,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:34.730529 env[1160]: time="2024-04-12T18:43:34.730481396Z" level=error msg="Failed to destroy network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.731624 env[1160]: time="2024-04-12T18:43:34.730735929Z" level=error msg="encountered an error cleaning up failed sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.731624 env[1160]: time="2024-04-12T18:43:34.730770801Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tz7j4,Uid:27b7d97e-5989-427d-83fb-824c0aaf557b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.731678 kubelet[2145]: E0412 18:43:34.730898 2145 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.731678 kubelet[2145]: E0412 18:43:34.730929 2145 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:34.731678 kubelet[2145]: E0412 18:43:34.730944 2145 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tz7j4" Apr 12 18:43:34.731875 kubelet[2145]: E0412 18:43:34.730998 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tz7j4_calico-system(27b7d97e-5989-427d-83fb-824c0aaf557b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tz7j4_calico-system(27b7d97e-5989-427d-83fb-824c0aaf557b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:34.731682 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b-shm.mount: Deactivated successfully. Apr 12 18:43:34.757019 kubelet[2145]: I0412 18:43:34.756716 2145 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:43:34.757245 env[1160]: time="2024-04-12T18:43:34.757227588Z" level=info msg="StopPodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\"" Apr 12 18:43:34.758564 kubelet[2145]: I0412 18:43:34.758474 2145 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:43:34.759346 env[1160]: time="2024-04-12T18:43:34.758795659Z" level=info msg="StopPodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\"" Apr 12 18:43:34.776957 env[1160]: time="2024-04-12T18:43:34.776886613Z" level=error msg="StopPodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" failed" error="failed to destroy network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.777104 kubelet[2145]: E0412 18:43:34.777085 2145 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:43:34.777582 kubelet[2145]: E0412 18:43:34.777567 2145 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576"} Apr 12 18:43:34.777619 kubelet[2145]: E0412 18:43:34.777600 2145 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47287052-b669-47a1-b443-c190dc2a920a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:34.777682 kubelet[2145]: E0412 18:43:34.777623 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47287052-b669-47a1-b443-c190dc2a920a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" podUID="47287052-b669-47a1-b443-c190dc2a920a" Apr 12 18:43:34.781438 env[1160]: time="2024-04-12T18:43:34.781402499Z" level=error msg="StopPodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" failed" error="failed to destroy network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.781694 kubelet[2145]: E0412 18:43:34.781680 2145 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:43:34.781740 kubelet[2145]: E0412 18:43:34.781707 2145 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b"} Apr 12 18:43:34.781740 kubelet[2145]: E0412 18:43:34.781728 2145 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"27b7d97e-5989-427d-83fb-824c0aaf557b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:34.781814 kubelet[2145]: E0412 18:43:34.781754 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"27b7d97e-5989-427d-83fb-824c0aaf557b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tz7j4" podUID="27b7d97e-5989-427d-83fb-824c0aaf557b" Apr 12 18:43:34.805964 env[1160]: time="2024-04-12T18:43:34.805935484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-sdm9s,Uid:4a8d6a00-5e14-44e4-ac13-3b10d879597b,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:34.812429 env[1160]: time="2024-04-12T18:43:34.812404088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-bzmbp,Uid:80613424-34c1-468f-ad23-dca75b8ce3ac,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:34.841907 env[1160]: time="2024-04-12T18:43:34.841866908Z" level=error msg="Failed to destroy network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.842121 env[1160]: time="2024-04-12T18:43:34.842098699Z" level=error msg="encountered an error cleaning up failed sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.842159 env[1160]: time="2024-04-12T18:43:34.842131965Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-sdm9s,Uid:4a8d6a00-5e14-44e4-ac13-3b10d879597b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.843039 kubelet[2145]: E0412 18:43:34.842275 2145 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.843039 kubelet[2145]: E0412 18:43:34.842319 2145 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-sdm9s" Apr 12 18:43:34.843039 kubelet[2145]: E0412 18:43:34.842333 2145 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-sdm9s" Apr 12 18:43:34.843159 kubelet[2145]: E0412 18:43:34.842375 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-sdm9s_kube-system(4a8d6a00-5e14-44e4-ac13-3b10d879597b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-sdm9s_kube-system(4a8d6a00-5e14-44e4-ac13-3b10d879597b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-sdm9s" podUID="4a8d6a00-5e14-44e4-ac13-3b10d879597b" Apr 12 18:43:34.888030 env[1160]: time="2024-04-12T18:43:34.887966915Z" level=error msg="Failed to destroy network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.888560 env[1160]: time="2024-04-12T18:43:34.888518003Z" level=error msg="encountered an error cleaning up failed sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.888683 env[1160]: time="2024-04-12T18:43:34.888664830Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-bzmbp,Uid:80613424-34c1-468f-ad23-dca75b8ce3ac,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.889013 kubelet[2145]: E0412 18:43:34.888982 2145 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:34.889066 kubelet[2145]: E0412 18:43:34.889052 2145 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-bzmbp" Apr 12 18:43:34.889091 kubelet[2145]: E0412 18:43:34.889078 2145 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-bzmbp" Apr 12 18:43:34.889160 kubelet[2145]: E0412 18:43:34.889139 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-bzmbp_kube-system(80613424-34c1-468f-ad23-dca75b8ce3ac)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-bzmbp_kube-system(80613424-34c1-468f-ad23-dca75b8ce3ac)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-bzmbp" podUID="80613424-34c1-468f-ad23-dca75b8ce3ac" Apr 12 18:43:35.760124 kubelet[2145]: I0412 18:43:35.760108 2145 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:43:35.761403 env[1160]: time="2024-04-12T18:43:35.761381566Z" level=info msg="StopPodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\"" Apr 12 18:43:35.762118 kubelet[2145]: I0412 18:43:35.762107 2145 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:43:35.762973 env[1160]: time="2024-04-12T18:43:35.762917419Z" level=info msg="StopPodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\"" Apr 12 18:43:35.806368 env[1160]: time="2024-04-12T18:43:35.806325214Z" level=error msg="StopPodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" failed" error="failed to destroy network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:35.806471 kubelet[2145]: E0412 18:43:35.806462 2145 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:43:35.806510 kubelet[2145]: E0412 18:43:35.806486 2145 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc"} Apr 12 18:43:35.806535 kubelet[2145]: E0412 18:43:35.806510 2145 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80613424-34c1-468f-ad23-dca75b8ce3ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:35.806535 kubelet[2145]: E0412 18:43:35.806531 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80613424-34c1-468f-ad23-dca75b8ce3ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-bzmbp" podUID="80613424-34c1-468f-ad23-dca75b8ce3ac" Apr 12 18:43:35.807630 env[1160]: time="2024-04-12T18:43:35.807601018Z" level=error msg="StopPodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" failed" error="failed to destroy network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:35.807682 kubelet[2145]: E0412 18:43:35.807672 2145 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:43:35.807960 kubelet[2145]: E0412 18:43:35.807687 2145 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c"} Apr 12 18:43:35.807960 kubelet[2145]: E0412 18:43:35.807707 2145 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4a8d6a00-5e14-44e4-ac13-3b10d879597b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:35.807960 kubelet[2145]: E0412 18:43:35.807723 2145 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4a8d6a00-5e14-44e4-ac13-3b10d879597b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-sdm9s" podUID="4a8d6a00-5e14-44e4-ac13-3b10d879597b" Apr 12 18:43:38.462926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2559684928.mount: Deactivated successfully. Apr 12 18:43:39.574908 env[1160]: time="2024-04-12T18:43:39.574865744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:39.603438 env[1160]: time="2024-04-12T18:43:39.603408585Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:39.612801 env[1160]: time="2024-04-12T18:43:39.612782832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:39.620611 env[1160]: time="2024-04-12T18:43:39.620582578Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:39.621058 env[1160]: time="2024-04-12T18:43:39.621036912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:43:39.645708 env[1160]: time="2024-04-12T18:43:39.645670447Z" level=info msg="CreateContainer within sandbox \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:43:39.687254 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1603103367.mount: Deactivated successfully. Apr 12 18:43:39.702029 env[1160]: time="2024-04-12T18:43:39.701980760Z" level=info msg="CreateContainer within sandbox \"0984bb86df0d4a32c319ad80bdd62aa7f6a684ec2b6ba84055be45d5b277a0fb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771\"" Apr 12 18:43:39.704075 env[1160]: time="2024-04-12T18:43:39.704051524Z" level=info msg="StartContainer for \"f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771\"" Apr 12 18:43:39.721204 systemd[1]: Started cri-containerd-f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771.scope. Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.738081 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:43:39.742429 kernel: audit: type=1400 audit(1712947419.734:1106): avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748883 kernel: audit: type=1300 audit(1712947419.734:1106): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f72bc2ff0a0 items=0 ppid=2579 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.748927 kernel: audit: type=1327 audit(1712947419.734:1106): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646664333035613632343132366433663835343037353331636537 Apr 12 18:43:39.748948 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748962 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f72bc2ff0a0 items=0 ppid=2579 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646664333035613632343132366433663835343037353331636537 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.754573 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.757407 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.760359 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.760395 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.765617 kernel: audit: type=1400 audit(1712947419.734:1107): avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.734000 audit: BPF prog-id=142 op=LOAD Apr 12 18:43:39.734000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003aa578 items=0 ppid=2579 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646664333035613632343132366433663835343037353331636537 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.737000 audit: BPF prog-id=143 op=LOAD Apr 12 18:43:39.737000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003aa5c8 items=0 ppid=2579 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646664333035613632343132366433663835343037353331636537 Apr 12 18:43:39.748000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:43:39.748000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.748000 audit: BPF prog-id=144 op=LOAD Apr 12 18:43:39.748000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003aa658 items=0 ppid=2579 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646664333035613632343132366433663835343037353331636537 Apr 12 18:43:39.778524 env[1160]: time="2024-04-12T18:43:39.778482856Z" level=info msg="StartContainer for \"f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771\" returns successfully" Apr 12 18:43:40.102158 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:43:40.102277 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:43:40.785401 kubelet[2145]: I0412 18:43:40.785373 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-7bkj9" podStartSLOduration=2.750339535 podStartE2EDuration="18.784716103s" podCreationTimestamp="2024-04-12 18:43:22 +0000 UTC" firstStartedPulling="2024-04-12 18:43:23.586879608 +0000 UTC m=+21.034809880" lastFinishedPulling="2024-04-12 18:43:39.621256176 +0000 UTC m=+37.069186448" observedRunningTime="2024-04-12 18:43:40.782985751 +0000 UTC m=+38.230916027" watchObservedRunningTime="2024-04-12 18:43:40.784716103 +0000 UTC m=+38.232646372" Apr 12 18:43:41.529000 audit[3157]: AVC avc: denied { write } for pid=3157 comm="tee" name="fd" dev="proc" ino=33784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.529000 audit[3157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff4eac97f a2=241 a3=1b6 items=1 ppid=3115 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.529000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:43:41.529000 audit: PATH item=0 name="/dev/fd/63" inode=33781 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.541000 audit[3149]: AVC avc: denied { write } for pid=3149 comm="tee" name="fd" dev="proc" ino=34734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.542000 audit[3159]: AVC avc: denied { write } for pid=3159 comm="tee" name="fd" dev="proc" ino=34737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.541000 audit[3149]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1548298f a2=241 a3=1b6 items=1 ppid=3119 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.541000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:43:41.541000 audit: PATH item=0 name="/dev/fd/63" inode=33778 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.542000 audit[3159]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9c2df98f a2=241 a3=1b6 items=1 ppid=3116 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.542000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:43:41.542000 audit: PATH item=0 name="/dev/fd/63" inode=34727 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.542000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.561000 audit[3172]: AVC avc: denied { write } for pid=3172 comm="tee" name="fd" dev="proc" ino=34822 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.561000 audit[3172]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdec678991 a2=241 a3=1b6 items=1 ppid=3120 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.565000 audit[3176]: AVC avc: denied { write } for pid=3176 comm="tee" name="fd" dev="proc" ino=34829 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.565000 audit[3176]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3f75698f a2=241 a3=1b6 items=1 ppid=3131 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.565000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:43:41.565000 audit: PATH item=0 name="/dev/fd/63" inode=34740 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.561000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:43:41.561000 audit: PATH item=0 name="/dev/fd/63" inode=33792 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.561000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.571000 audit[3189]: AVC avc: denied { write } for pid=3189 comm="tee" name="fd" dev="proc" ino=34760 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.571000 audit[3189]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff68d75990 a2=241 a3=1b6 items=1 ppid=3122 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.575000 audit[3187]: AVC avc: denied { write } for pid=3187 comm="tee" name="fd" dev="proc" ino=34833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:41.571000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:43:41.571000 audit: PATH item=0 name="/dev/fd/63" inode=34757 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.575000 audit[3187]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff01030980 a2=241 a3=1b6 items=1 ppid=3114 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.575000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:43:41.575000 audit: PATH item=0 name="/dev/fd/63" inode=34826 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:41.575000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:41.775995 kubelet[2145]: I0412 18:43:41.775977 2145 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:43:47.668953 env[1160]: time="2024-04-12T18:43:47.668922256Z" level=info msg="StopPodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\"" Apr 12 18:43:47.669373 env[1160]: time="2024-04-12T18:43:47.669006667Z" level=info msg="StopPodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\"" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:47.836 [INFO][3332] k8s.go 585: Cleaning up netns ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:47.836 [INFO][3332] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" iface="eth0" netns="/var/run/netns/cni-bd4cab20-b931-6910-802e-1f606451c47c" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:47.836 [INFO][3332] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" iface="eth0" netns="/var/run/netns/cni-bd4cab20-b931-6910-802e-1f606451c47c" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:47.837 [INFO][3332] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" iface="eth0" netns="/var/run/netns/cni-bd4cab20-b931-6910-802e-1f606451c47c" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:47.837 [INFO][3332] k8s.go 592: Releasing IP address(es) ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:47.837 [INFO][3332] utils.go 188: Calico CNI releasing IP address ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.363 [INFO][3345] ipam_plugin.go 415: Releasing address using handleID ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.364 [INFO][3345] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.366 [INFO][3345] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.379 [WARNING][3345] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.379 [INFO][3345] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.380 [INFO][3345] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:48.384924 env[1160]: 2024-04-12 18:43:48.382 [INFO][3332] k8s.go 598: Teardown processing complete. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:43:48.386474 systemd[1]: run-netns-cni\x2dbd4cab20\x2db931\x2d6910\x2d802e\x2d1f606451c47c.mount: Deactivated successfully. Apr 12 18:43:48.387660 env[1160]: time="2024-04-12T18:43:48.387636271Z" level=info msg="TearDown network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" successfully" Apr 12 18:43:48.387718 env[1160]: time="2024-04-12T18:43:48.387706306Z" level=info msg="StopPodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" returns successfully" Apr 12 18:43:48.388234 env[1160]: time="2024-04-12T18:43:48.388221436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tz7j4,Uid:27b7d97e-5989-427d-83fb-824c0aaf557b,Namespace:calico-system,Attempt:1,}" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:47.795 [INFO][3333] k8s.go 585: Cleaning up netns ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:47.801 [INFO][3333] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" iface="eth0" netns="/var/run/netns/cni-b8a9f803-f50f-6db4-3adb-b7ee27614431" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:47.801 [INFO][3333] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" iface="eth0" netns="/var/run/netns/cni-b8a9f803-f50f-6db4-3adb-b7ee27614431" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:47.819 [INFO][3333] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" iface="eth0" netns="/var/run/netns/cni-b8a9f803-f50f-6db4-3adb-b7ee27614431" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:47.819 [INFO][3333] k8s.go 592: Releasing IP address(es) ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:47.819 [INFO][3333] utils.go 188: Calico CNI releasing IP address ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.363 [INFO][3344] ipam_plugin.go 415: Releasing address using handleID ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.364 [INFO][3344] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.380 [INFO][3344] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.384 [WARNING][3344] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.384 [INFO][3344] ipam_plugin.go 443: Releasing address using workloadID ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.387 [INFO][3344] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:48.390051 env[1160]: 2024-04-12 18:43:48.389 [INFO][3333] k8s.go 598: Teardown processing complete. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:43:48.391497 systemd[1]: run-netns-cni\x2db8a9f803\x2df50f\x2d6db4\x2d3adb\x2db7ee27614431.mount: Deactivated successfully. Apr 12 18:43:48.391821 env[1160]: time="2024-04-12T18:43:48.391794586Z" level=info msg="TearDown network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" successfully" Apr 12 18:43:48.391876 env[1160]: time="2024-04-12T18:43:48.391864634Z" level=info msg="StopPodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" returns successfully" Apr 12 18:43:48.392247 env[1160]: time="2024-04-12T18:43:48.392227723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b689475f8-rtdhx,Uid:47287052-b669-47a1-b443-c190dc2a920a,Namespace:calico-system,Attempt:1,}" Apr 12 18:43:48.503434 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:43:48.503515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9412f90bc2b: link becomes ready Apr 12 18:43:48.509245 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieae516a8de9: link becomes ready Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.418 [INFO][3376] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.428 [INFO][3376] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--tz7j4-eth0 csi-node-driver- calico-system 27b7d97e-5989-427d-83fb-824c0aaf557b 705 0 2024-04-12 18:43:22 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-tz7j4 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9412f90bc2b [] []}} ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.428 [INFO][3376] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.455 [INFO][3398] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" HandleID="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.463 [INFO][3398] ipam_plugin.go 268: Auto assigning IP ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" HandleID="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000294150), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-tz7j4", "timestamp":"2024-04-12 18:43:48.455872548 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.463 [INFO][3398] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.463 [INFO][3398] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.463 [INFO][3398] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.464 [INFO][3398] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.472 [INFO][3398] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.475 [INFO][3398] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.477 [INFO][3398] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.478 [INFO][3398] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.478 [INFO][3398] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.479 [INFO][3398] ipam.go 1682: Creating new handle: k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7 Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.482 [INFO][3398] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.485 [INFO][3398] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.485 [INFO][3398] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" host="localhost" Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.485 [INFO][3398] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:48.517967 env[1160]: 2024-04-12 18:43:48.485 [INFO][3398] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" HandleID="k8s-pod-network.f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.487 [INFO][3376] k8s.go 385: Populated endpoint ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tz7j4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27b7d97e-5989-427d-83fb-824c0aaf557b", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-tz7j4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9412f90bc2b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.487 [INFO][3376] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.487 [INFO][3376] dataplane_linux.go 68: Setting the host side veth name to cali9412f90bc2b ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.503 [INFO][3376] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.503 [INFO][3376] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tz7j4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27b7d97e-5989-427d-83fb-824c0aaf557b", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7", Pod:"csi-node-driver-tz7j4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9412f90bc2b", MAC:"92:ea:1b:b7:f1:83", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.517 [INFO][3376] k8s.go 498: Wrote updated endpoint to datastore ContainerID="f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7" Namespace="calico-system" Pod="csi-node-driver-tz7j4" WorkloadEndpoint="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.438 [INFO][3378] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.444 [INFO][3378] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0 calico-kube-controllers-6b689475f8- calico-system 47287052-b669-47a1-b443-c190dc2a920a 704 0 2024-04-12 18:43:22 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6b689475f8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6b689475f8-rtdhx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calieae516a8de9 [] []}} ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-" Apr 12 18:43:48.530751 env[1160]: 2024-04-12 18:43:48.444 [INFO][3378] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.528549 systemd-networkd[1067]: cali9412f90bc2b: Link UP Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.473 [INFO][3406] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" HandleID="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.482 [INFO][3406] ipam_plugin.go 268: Auto assigning IP ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" HandleID="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b1c10), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6b689475f8-rtdhx", "timestamp":"2024-04-12 18:43:48.473520853 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.482 [INFO][3406] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.485 [INFO][3406] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.485 [INFO][3406] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.487 [INFO][3406] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.490 [INFO][3406] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.492 [INFO][3406] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.493 [INFO][3406] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.494 [INFO][3406] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.494 [INFO][3406] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.495 [INFO][3406] ipam.go 1682: Creating new handle: k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646 Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.498 [INFO][3406] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.502 [INFO][3406] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.503 [INFO][3406] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" host="localhost" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.503 [INFO][3406] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.503 [INFO][3406] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" HandleID="k8s-pod-network.90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.505 [INFO][3378] k8s.go 385: Populated endpoint ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0", GenerateName:"calico-kube-controllers-6b689475f8-", Namespace:"calico-system", SelfLink:"", UID:"47287052-b669-47a1-b443-c190dc2a920a", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b689475f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6b689475f8-rtdhx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieae516a8de9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.505 [INFO][3378] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.574637 env[1160]: 2024-04-12 18:43:48.505 [INFO][3378] dataplane_linux.go 68: Setting the host side veth name to calieae516a8de9 ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.528909 systemd-networkd[1067]: cali9412f90bc2b: Gained carrier Apr 12 18:43:48.575144 env[1160]: 2024-04-12 18:43:48.507 [INFO][3378] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.575144 env[1160]: 2024-04-12 18:43:48.507 [INFO][3378] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0", GenerateName:"calico-kube-controllers-6b689475f8-", Namespace:"calico-system", SelfLink:"", UID:"47287052-b669-47a1-b443-c190dc2a920a", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b689475f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646", Pod:"calico-kube-controllers-6b689475f8-rtdhx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieae516a8de9", MAC:"7e:42:3a:b6:36:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:48.575144 env[1160]: 2024-04-12 18:43:48.527 [INFO][3378] k8s.go 498: Wrote updated endpoint to datastore ContainerID="90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646" Namespace="calico-system" Pod="calico-kube-controllers-6b689475f8-rtdhx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.538102829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.538136148Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.538143356Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.538270578Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7 pid=3444 runtime=io.containerd.runc.v2 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.550069646Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.550104732Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.550132153Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:48.575144 env[1160]: time="2024-04-12T18:43:48.550229061Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646 pid=3461 runtime=io.containerd.runc.v2 Apr 12 18:43:48.565109 systemd-networkd[1067]: calieae516a8de9: Link UP Apr 12 18:43:48.565203 systemd-networkd[1067]: calieae516a8de9: Gained carrier Apr 12 18:43:48.586842 systemd[1]: Started cri-containerd-90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646.scope. Apr 12 18:43:48.589348 systemd[1]: Started cri-containerd-f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7.scope. Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.609229 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:43:48.609267 kernel: audit: type=1400 audit(1712947428.607:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.613700 kernel: audit: type=1400 audit(1712947428.607:1120): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.619713 kernel: audit: audit_backlog=66 > audit_backlog_limit=64 Apr 12 18:43:48.619810 kernel: audit: audit_backlog=66 > audit_backlog_limit=64 Apr 12 18:43:48.619857 kernel: audit: audit_lost=32 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:43:48.619880 kernel: audit: audit_lost=33 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:43:48.619893 kernel: audit: backlog limit exceeded Apr 12 18:43:48.621632 kernel: audit: audit_backlog=66 > audit_backlog_limit=64 Apr 12 18:43:48.622125 kernel: audit: audit_lost=34 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:43:48.622157 kernel: audit: backlog limit exceeded Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.607000 audit: BPF prog-id=145 op=LOAD Apr 12 18:43:48.613000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.613000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656336393438343739363664373363373833636664663266623562 Apr 12 18:43:48.613000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.613000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656336393438343739363664373363373833636664663266623562 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit: BPF prog-id=146 op=LOAD Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit: BPF prog-id=147 op=LOAD Apr 12 18:43:48.614000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000224c90 items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656336393438343739363664373363373833636664663266623562 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3444 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663735616432356133393335383738363864323266666365393831 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit: BPF prog-id=148 op=LOAD Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000224cd8 items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656336393438343739363664373363373833636664663266623562 Apr 12 18:43:48.614000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:43:48.614000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3444 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663735616432356133393335383738363864323266666365393831 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit: BPF prog-id=149 op=LOAD Apr 12 18:43:48.614000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002250e8 items=0 ppid=3461 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930656336393438343739363664373363373833636664663266623562 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.614000 audit: BPF prog-id=150 op=LOAD Apr 12 18:43:48.614000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032f7a0 items=0 ppid=3444 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663735616432356133393335383738363864323266666365393831 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit: BPF prog-id=151 op=LOAD Apr 12 18:43:48.621000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032f7e8 items=0 ppid=3444 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663735616432356133393335383738363864323266666365393831 Apr 12 18:43:48.621000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:43:48.621000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.621000 audit: BPF prog-id=152 op=LOAD Apr 12 18:43:48.621000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032fbf8 items=0 ppid=3444 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663735616432356133393335383738363864323266666365393831 Apr 12 18:43:48.621326 systemd-resolved[1107]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:48.622887 systemd-resolved[1107]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:48.652586 env[1160]: time="2024-04-12T18:43:48.648081915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tz7j4,Uid:27b7d97e-5989-427d-83fb-824c0aaf557b,Namespace:calico-system,Attempt:1,} returns sandbox id \"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7\"" Apr 12 18:43:48.653504 env[1160]: time="2024-04-12T18:43:48.653479592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b689475f8-rtdhx,Uid:47287052-b669-47a1-b443-c190dc2a920a,Namespace:calico-system,Attempt:1,} returns sandbox id \"90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646\"" Apr 12 18:43:48.654239 env[1160]: time="2024-04-12T18:43:48.654220180Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:43:48.671707 env[1160]: time="2024-04-12T18:43:48.669730045Z" level=info msg="StopPodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\"" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.695 [INFO][3533] k8s.go 585: Cleaning up netns ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.696 [INFO][3533] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" iface="eth0" netns="/var/run/netns/cni-ffc92009-9fd0-c23e-6659-c979530548aa" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.697 [INFO][3533] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" iface="eth0" netns="/var/run/netns/cni-ffc92009-9fd0-c23e-6659-c979530548aa" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.697 [INFO][3533] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" iface="eth0" netns="/var/run/netns/cni-ffc92009-9fd0-c23e-6659-c979530548aa" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.697 [INFO][3533] k8s.go 592: Releasing IP address(es) ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.697 [INFO][3533] utils.go 188: Calico CNI releasing IP address ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.711 [INFO][3539] ipam_plugin.go 415: Releasing address using handleID ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.711 [INFO][3539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.711 [INFO][3539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.723 [WARNING][3539] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.723 [INFO][3539] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.724 [INFO][3539] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:48.726903 env[1160]: 2024-04-12 18:43:48.725 [INFO][3533] k8s.go 598: Teardown processing complete. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:43:48.727278 env[1160]: time="2024-04-12T18:43:48.727083052Z" level=info msg="TearDown network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" successfully" Apr 12 18:43:48.727278 env[1160]: time="2024-04-12T18:43:48.727112124Z" level=info msg="StopPodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" returns successfully" Apr 12 18:43:48.727565 env[1160]: time="2024-04-12T18:43:48.727534771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-bzmbp,Uid:80613424-34c1-468f-ad23-dca75b8ce3ac,Namespace:kube-system,Attempt:1,}" Apr 12 18:43:48.817718 systemd-networkd[1067]: calied0f77100e4: Link UP Apr 12 18:43:48.817987 systemd-networkd[1067]: calied0f77100e4: Gained carrier Apr 12 18:43:48.818558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calied0f77100e4: link becomes ready Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.766 [INFO][3546] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.772 [INFO][3546] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--bzmbp-eth0 coredns-76f75df574- kube-system 80613424-34c1-468f-ad23-dca75b8ce3ac 717 0 2024-04-12 18:43:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-bzmbp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calied0f77100e4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.772 [INFO][3546] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.793 [INFO][3557] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" HandleID="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.798 [INFO][3557] ipam_plugin.go 268: Auto assigning IP ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" HandleID="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005095c0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-bzmbp", "timestamp":"2024-04-12 18:43:48.79311899 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.799 [INFO][3557] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.799 [INFO][3557] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.799 [INFO][3557] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.800 [INFO][3557] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.802 [INFO][3557] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.804 [INFO][3557] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.806 [INFO][3557] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.807 [INFO][3557] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.807 [INFO][3557] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.808 [INFO][3557] ipam.go 1682: Creating new handle: k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.810 [INFO][3557] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.812 [INFO][3557] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.812 [INFO][3557] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" host="localhost" Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.812 [INFO][3557] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:48.826330 env[1160]: 2024-04-12 18:43:48.812 [INFO][3557] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" HandleID="k8s-pod-network.02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.826959 env[1160]: 2024-04-12 18:43:48.814 [INFO][3546] k8s.go 385: Populated endpoint ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--bzmbp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"80613424-34c1-468f-ad23-dca75b8ce3ac", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-bzmbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied0f77100e4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:48.826959 env[1160]: 2024-04-12 18:43:48.814 [INFO][3546] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.826959 env[1160]: 2024-04-12 18:43:48.814 [INFO][3546] dataplane_linux.go 68: Setting the host side veth name to calied0f77100e4 ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.826959 env[1160]: 2024-04-12 18:43:48.818 [INFO][3546] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.826959 env[1160]: 2024-04-12 18:43:48.818 [INFO][3546] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--bzmbp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"80613424-34c1-468f-ad23-dca75b8ce3ac", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f", Pod:"coredns-76f75df574-bzmbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied0f77100e4", MAC:"7a:3b:65:ef:9d:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:48.826959 env[1160]: 2024-04-12 18:43:48.823 [INFO][3546] k8s.go 498: Wrote updated endpoint to datastore ContainerID="02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f" Namespace="kube-system" Pod="coredns-76f75df574-bzmbp" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:43:48.840413 env[1160]: time="2024-04-12T18:43:48.840351468Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:48.840536 env[1160]: time="2024-04-12T18:43:48.840384195Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:48.840536 env[1160]: time="2024-04-12T18:43:48.840391474Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:48.840536 env[1160]: time="2024-04-12T18:43:48.840490743Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f pid=3582 runtime=io.containerd.runc.v2 Apr 12 18:43:48.847872 systemd[1]: Started cri-containerd-02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f.scope. Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.855000 audit: BPF prog-id=153 op=LOAD Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3582 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383938646461633363636234353231653466383266633936363630 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3582 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383938646461633363636234353231653466383266633936363630 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit: BPF prog-id=154 op=LOAD Apr 12 18:43:48.856000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000222350 items=0 ppid=3582 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383938646461633363636234353231653466383266633936363630 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit: BPF prog-id=155 op=LOAD Apr 12 18:43:48.856000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000222398 items=0 ppid=3582 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383938646461633363636234353231653466383266633936363630 Apr 12 18:43:48.856000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:43:48.856000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.856000 audit: BPF prog-id=156 op=LOAD Apr 12 18:43:48.856000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002227a8 items=0 ppid=3582 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383938646461633363636234353231653466383266633936363630 Apr 12 18:43:48.857311 systemd-resolved[1107]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:48.877691 env[1160]: time="2024-04-12T18:43:48.877661970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-bzmbp,Uid:80613424-34c1-468f-ad23-dca75b8ce3ac,Namespace:kube-system,Attempt:1,} returns sandbox id \"02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f\"" Apr 12 18:43:48.881676 env[1160]: time="2024-04-12T18:43:48.881654289Z" level=info msg="CreateContainer within sandbox \"02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:43:48.892014 env[1160]: time="2024-04-12T18:43:48.891992038Z" level=info msg="CreateContainer within sandbox \"02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"45b7e077d1eca5ca07cafe990b2889f0a682de910320b61fa981a639edba4ce3\"" Apr 12 18:43:48.893252 env[1160]: time="2024-04-12T18:43:48.893230636Z" level=info msg="StartContainer for \"45b7e077d1eca5ca07cafe990b2889f0a682de910320b61fa981a639edba4ce3\"" Apr 12 18:43:48.902566 systemd[1]: Started cri-containerd-45b7e077d1eca5ca07cafe990b2889f0a682de910320b61fa981a639edba4ce3.scope. Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.913000 audit: BPF prog-id=157 op=LOAD Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3582 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623765303737643165636135636130376361666539393062323838 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3582 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623765303737643165636135636130376361666539393062323838 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.914000 audit: BPF prog-id=158 op=LOAD Apr 12 18:43:48.914000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00023ab60 items=0 ppid=3582 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623765303737643165636135636130376361666539393062323838 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit: BPF prog-id=159 op=LOAD Apr 12 18:43:48.915000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00023aba8 items=0 ppid=3582 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623765303737643165636135636130376361666539393062323838 Apr 12 18:43:48.915000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:43:48.915000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:48.915000 audit: BPF prog-id=160 op=LOAD Apr 12 18:43:48.915000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00023afb8 items=0 ppid=3582 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623765303737643165636135636130376361666539393062323838 Apr 12 18:43:48.924156 env[1160]: time="2024-04-12T18:43:48.924127505Z" level=info msg="StartContainer for \"45b7e077d1eca5ca07cafe990b2889f0a682de910320b61fa981a639edba4ce3\" returns successfully" Apr 12 18:43:49.388787 systemd[1]: run-netns-cni\x2dffc92009\x2d9fd0\x2dc23e\x2d6659\x2dc979530548aa.mount: Deactivated successfully. Apr 12 18:43:49.621660 systemd-networkd[1067]: cali9412f90bc2b: Gained IPv6LL Apr 12 18:43:49.794279 kubelet[2145]: I0412 18:43:49.794038 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-bzmbp" podStartSLOduration=33.794015531 podStartE2EDuration="33.794015531s" podCreationTimestamp="2024-04-12 18:43:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:49.793449612 +0000 UTC m=+47.241379886" watchObservedRunningTime="2024-04-12 18:43:49.794015531 +0000 UTC m=+47.241945799" Apr 12 18:43:49.894996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3999010464.mount: Deactivated successfully. Apr 12 18:43:49.899000 audit[3679]: NETFILTER_CFG table=filter:95 family=2 entries=13 op=nft_register_rule pid=3679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:49.899000 audit[3679]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc4fcae910 a2=0 a3=7ffc4fcae8fc items=0 ppid=2276 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:49.900000 audit[3679]: NETFILTER_CFG table=nat:96 family=2 entries=33 op=nft_register_chain pid=3679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:49.900000 audit[3679]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffc4fcae910 a2=0 a3=7ffc4fcae8fc items=0 ppid=2276 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:49.925000 audit[3682]: NETFILTER_CFG table=filter:97 family=2 entries=10 op=nft_register_rule pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:49.925000 audit[3682]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe4ecc2fe0 a2=0 a3=7ffe4ecc2fcc items=0 ppid=2276 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:49.929000 audit[3682]: NETFILTER_CFG table=nat:98 family=2 entries=18 op=nft_register_rule pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:49.929000 audit[3682]: SYSCALL arch=c000003e syscall=46 success=yes exit=5004 a0=3 a1=7ffe4ecc2fe0 a2=0 a3=7ffe4ecc2fcc items=0 ppid=2276 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:49.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:50.134617 systemd-networkd[1067]: calieae516a8de9: Gained IPv6LL Apr 12 18:43:50.240164 env[1160]: time="2024-04-12T18:43:50.240130141Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:50.240909 env[1160]: time="2024-04-12T18:43:50.240891881Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:50.241818 env[1160]: time="2024-04-12T18:43:50.241786923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:50.242616 env[1160]: time="2024-04-12T18:43:50.242599652Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:50.243028 env[1160]: time="2024-04-12T18:43:50.243011667Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:43:50.244761 env[1160]: time="2024-04-12T18:43:50.244746961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:43:50.246856 env[1160]: time="2024-04-12T18:43:50.246836140Z" level=info msg="CreateContainer within sandbox \"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:43:50.253806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount463603391.mount: Deactivated successfully. Apr 12 18:43:50.266048 env[1160]: time="2024-04-12T18:43:50.266024385Z" level=info msg="CreateContainer within sandbox \"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"36007d00d71a0e0fec3371c3a93c956344c19f2b4563e8ba88446564d0dd26ad\"" Apr 12 18:43:50.267251 env[1160]: time="2024-04-12T18:43:50.267236088Z" level=info msg="StartContainer for \"36007d00d71a0e0fec3371c3a93c956344c19f2b4563e8ba88446564d0dd26ad\"" Apr 12 18:43:50.280643 systemd[1]: Started cri-containerd-36007d00d71a0e0fec3371c3a93c956344c19f2b4563e8ba88446564d0dd26ad.scope. Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f60645c5ab8 items=0 ppid=3444 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303037643030643731613065306665633333373163336139336339 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.292000 audit: BPF prog-id=161 op=LOAD Apr 12 18:43:50.292000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b03d8 items=0 ppid=3444 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303037643030643731613065306665633333373163336139336339 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit: BPF prog-id=162 op=LOAD Apr 12 18:43:50.293000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000b0428 items=0 ppid=3444 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303037643030643731613065306665633333373163336139336339 Apr 12 18:43:50.293000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:43:50.293000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.293000 audit: BPF prog-id=163 op=LOAD Apr 12 18:43:50.293000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000b04b8 items=0 ppid=3444 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303037643030643731613065306665633333373163336139336339 Apr 12 18:43:50.302622 env[1160]: time="2024-04-12T18:43:50.302595531Z" level=info msg="StartContainer for \"36007d00d71a0e0fec3371c3a93c956344c19f2b4563e8ba88446564d0dd26ad\" returns successfully" Apr 12 18:43:50.472044 kubelet[2145]: I0412 18:43:50.471807 2145 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:43:50.487136 systemd[1]: run-containerd-runc-k8s.io-f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771-runc.igFvDf.mount: Deactivated successfully. Apr 12 18:43:50.670418 env[1160]: time="2024-04-12T18:43:50.670391010Z" level=info msg="StopPodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\"" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.702 [INFO][3799] k8s.go 585: Cleaning up netns ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.702 [INFO][3799] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" iface="eth0" netns="/var/run/netns/cni-1f7b75d9-849e-f606-2463-8307dff259b9" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.702 [INFO][3799] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" iface="eth0" netns="/var/run/netns/cni-1f7b75d9-849e-f606-2463-8307dff259b9" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.703 [INFO][3799] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" iface="eth0" netns="/var/run/netns/cni-1f7b75d9-849e-f606-2463-8307dff259b9" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.703 [INFO][3799] k8s.go 592: Releasing IP address(es) ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.703 [INFO][3799] utils.go 188: Calico CNI releasing IP address ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.715 [INFO][3805] ipam_plugin.go 415: Releasing address using handleID ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.715 [INFO][3805] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.715 [INFO][3805] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.719 [WARNING][3805] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.719 [INFO][3805] ipam_plugin.go 443: Releasing address using workloadID ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.720 [INFO][3805] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:50.722313 env[1160]: 2024-04-12 18:43:50.721 [INFO][3799] k8s.go 598: Teardown processing complete. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:43:50.722909 env[1160]: time="2024-04-12T18:43:50.722750128Z" level=info msg="TearDown network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" successfully" Apr 12 18:43:50.722909 env[1160]: time="2024-04-12T18:43:50.722774653Z" level=info msg="StopPodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" returns successfully" Apr 12 18:43:50.723333 env[1160]: time="2024-04-12T18:43:50.723319881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-sdm9s,Uid:4a8d6a00-5e14-44e4-ac13-3b10d879597b,Namespace:kube-system,Attempt:1,}" Apr 12 18:43:50.774717 systemd-networkd[1067]: calied0f77100e4: Gained IPv6LL Apr 12 18:43:50.789528 systemd-networkd[1067]: cali48bc2dcf420: Link UP Apr 12 18:43:50.791979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:43:50.792292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali48bc2dcf420: link becomes ready Apr 12 18:43:50.792076 systemd-networkd[1067]: cali48bc2dcf420: Gained carrier Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.740 [INFO][3812] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.751 [INFO][3812] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--sdm9s-eth0 coredns-76f75df574- kube-system 4a8d6a00-5e14-44e4-ac13-3b10d879597b 742 0 2024-04-12 18:43:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-sdm9s eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali48bc2dcf420 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.751 [INFO][3812] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.766 [INFO][3825] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" HandleID="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.771 [INFO][3825] ipam_plugin.go 268: Auto assigning IP ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" HandleID="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005316d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-sdm9s", "timestamp":"2024-04-12 18:43:50.7665013 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.771 [INFO][3825] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.771 [INFO][3825] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.771 [INFO][3825] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.772 [INFO][3825] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.776 [INFO][3825] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.777 [INFO][3825] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.778 [INFO][3825] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.779 [INFO][3825] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.779 [INFO][3825] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.780 [INFO][3825] ipam.go 1682: Creating new handle: k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6 Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.782 [INFO][3825] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.785 [INFO][3825] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.785 [INFO][3825] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" host="localhost" Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.785 [INFO][3825] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:50.799625 env[1160]: 2024-04-12 18:43:50.785 [INFO][3825] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" HandleID="k8s-pod-network.9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.804256 env[1160]: 2024-04-12 18:43:50.786 [INFO][3812] k8s.go 385: Populated endpoint ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--sdm9s-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4a8d6a00-5e14-44e4-ac13-3b10d879597b", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-sdm9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bc2dcf420", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:50.804256 env[1160]: 2024-04-12 18:43:50.786 [INFO][3812] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.804256 env[1160]: 2024-04-12 18:43:50.786 [INFO][3812] dataplane_linux.go 68: Setting the host side veth name to cali48bc2dcf420 ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.804256 env[1160]: 2024-04-12 18:43:50.792 [INFO][3812] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.804256 env[1160]: 2024-04-12 18:43:50.792 [INFO][3812] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--sdm9s-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4a8d6a00-5e14-44e4-ac13-3b10d879597b", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6", Pod:"coredns-76f75df574-sdm9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bc2dcf420", MAC:"a2:10:84:7c:6d:15", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:50.804256 env[1160]: 2024-04-12 18:43:50.797 [INFO][3812] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6" Namespace="kube-system" Pod="coredns-76f75df574-sdm9s" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:43:50.808812 env[1160]: time="2024-04-12T18:43:50.808762114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:50.808864 env[1160]: time="2024-04-12T18:43:50.808826346Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:50.808864 env[1160]: time="2024-04-12T18:43:50.808844187Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:50.809020 env[1160]: time="2024-04-12T18:43:50.808996246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6 pid=3850 runtime=io.containerd.runc.v2 Apr 12 18:43:50.816402 systemd[1]: Started cri-containerd-9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6.scope. Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit: BPF prog-id=164 op=LOAD Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3850 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326235336439353063383739323862316635636566386431666361 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3850 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326235336439353063383739323862316635636566386431666361 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit: BPF prog-id=165 op=LOAD Apr 12 18:43:50.825000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025fce0 items=0 ppid=3850 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326235336439353063383739323862316635636566386431666361 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit: BPF prog-id=166 op=LOAD Apr 12 18:43:50.825000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025fd28 items=0 ppid=3850 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326235336439353063383739323862316635636566386431666361 Apr 12 18:43:50.825000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:43:50.825000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.825000 audit: BPF prog-id=167 op=LOAD Apr 12 18:43:50.825000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2138 items=0 ppid=3850 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326235336439353063383739323862316635636566386431666361 Apr 12 18:43:50.828026 systemd-resolved[1107]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:50.854964 env[1160]: time="2024-04-12T18:43:50.854938242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-sdm9s,Uid:4a8d6a00-5e14-44e4-ac13-3b10d879597b,Namespace:kube-system,Attempt:1,} returns sandbox id \"9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6\"" Apr 12 18:43:50.857151 env[1160]: time="2024-04-12T18:43:50.857127876Z" level=info msg="CreateContainer within sandbox \"9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:43:50.892897 env[1160]: time="2024-04-12T18:43:50.892870954Z" level=info msg="CreateContainer within sandbox \"9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a876ce715441aecb83b3e28f3a23ce54a5adaf81887cc6c0a6ed3af5eac78759\"" Apr 12 18:43:50.894135 env[1160]: time="2024-04-12T18:43:50.894097473Z" level=info msg="StartContainer for \"a876ce715441aecb83b3e28f3a23ce54a5adaf81887cc6c0a6ed3af5eac78759\"" Apr 12 18:43:50.903524 systemd[1]: Started cri-containerd-a876ce715441aecb83b3e28f3a23ce54a5adaf81887cc6c0a6ed3af5eac78759.scope. Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.913000 audit: BPF prog-id=168 op=LOAD Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3850 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373663653731353434316165636238336233653238663361323363 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3850 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373663653731353434316165636238336233653238663361323363 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit: BPF prog-id=169 op=LOAD Apr 12 18:43:50.914000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000255d40 items=0 ppid=3850 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373663653731353434316165636238336233653238663361323363 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit: BPF prog-id=170 op=LOAD Apr 12 18:43:50.914000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000255d88 items=0 ppid=3850 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373663653731353434316165636238336233653238663361323363 Apr 12 18:43:50.914000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:43:50.914000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:50.914000 audit: BPF prog-id=171 op=LOAD Apr 12 18:43:50.914000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a4198 items=0 ppid=3850 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373663653731353434316165636238336233653238663361323363 Apr 12 18:43:50.924959 env[1160]: time="2024-04-12T18:43:50.924931526Z" level=info msg="StartContainer for \"a876ce715441aecb83b3e28f3a23ce54a5adaf81887cc6c0a6ed3af5eac78759\" returns successfully" Apr 12 18:43:51.388977 systemd[1]: run-containerd-runc-k8s.io-f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771-runc.GMRiZR.mount: Deactivated successfully. Apr 12 18:43:51.389063 systemd[1]: run-netns-cni\x2d1f7b75d9\x2d849e\x2df606\x2d2463\x2d8307dff259b9.mount: Deactivated successfully. Apr 12 18:43:51.809000 audit[3947]: NETFILTER_CFG table=filter:99 family=2 entries=10 op=nft_register_rule pid=3947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:51.809000 audit[3947]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffc02c1cd0 a2=0 a3=7fffc02c1cbc items=0 ppid=2276 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:51.809000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:51.812216 kubelet[2145]: I0412 18:43:51.812191 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-sdm9s" podStartSLOduration=35.812163285 podStartE2EDuration="35.812163285s" podCreationTimestamp="2024-04-12 18:43:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:51.802830626 +0000 UTC m=+49.250760902" watchObservedRunningTime="2024-04-12 18:43:51.812163285 +0000 UTC m=+49.260093556" Apr 12 18:43:51.811000 audit[3947]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=3947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:51.811000 audit[3947]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7fffc02c1cd0 a2=0 a3=7fffc02c1cbc items=0 ppid=2276 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:51.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:52.117751 systemd-networkd[1067]: cali48bc2dcf420: Gained IPv6LL Apr 12 18:43:52.831000 audit[3969]: NETFILTER_CFG table=filter:101 family=2 entries=10 op=nft_register_rule pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:52.831000 audit[3969]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffec8400170 a2=0 a3=7ffec840015c items=0 ppid=2276 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:52.925000 audit[3969]: NETFILTER_CFG table=nat:102 family=2 entries=54 op=nft_register_chain pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:52.925000 audit[3969]: SYSCALL arch=c000003e syscall=46 success=yes exit=19092 a0=3 a1=7ffec8400170 a2=0 a3=7ffec840015c items=0 ppid=2276 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:53.077129 kubelet[2145]: I0412 18:43:53.077094 2145 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:43:53.158418 env[1160]: time="2024-04-12T18:43:53.158349384Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.159244 env[1160]: time="2024-04-12T18:43:53.159225309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.160364 env[1160]: time="2024-04-12T18:43:53.160349162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.163243 env[1160]: time="2024-04-12T18:43:53.163223476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.163709 env[1160]: time="2024-04-12T18:43:53.163692221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:43:53.164611 env[1160]: time="2024-04-12T18:43:53.164588882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:43:53.180220 env[1160]: time="2024-04-12T18:43:53.180193857Z" level=info msg="CreateContainer within sandbox \"90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:43:53.202022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount515257173.mount: Deactivated successfully. Apr 12 18:43:53.204571 env[1160]: time="2024-04-12T18:43:53.204197760Z" level=info msg="CreateContainer within sandbox \"90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477\"" Apr 12 18:43:53.204645 env[1160]: time="2024-04-12T18:43:53.204572409Z" level=info msg="StartContainer for \"e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477\"" Apr 12 18:43:53.223730 systemd[1]: Started cri-containerd-e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477.scope. Apr 12 18:43:53.250000 audit[4012]: NETFILTER_CFG table=filter:103 family=2 entries=9 op=nft_register_rule pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:53.250000 audit[4012]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd4890ee30 a2=0 a3=7ffd4890ee1c items=0 ppid=2276 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:53.251000 audit[4012]: NETFILTER_CFG table=nat:104 family=2 entries=25 op=nft_register_chain pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffd4890ee30 a2=0 a3=7ffd4890ee1c items=0 ppid=2276 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit: BPF prog-id=172 op=LOAD Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3461 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613331376132656530303962613461386333376361313261373336 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3461 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613331376132656530303962613461386333376361313261373336 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit: BPF prog-id=173 op=LOAD Apr 12 18:43:53.261000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003c8100 items=0 ppid=3461 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613331376132656530303962613461386333376361313261373336 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit: BPF prog-id=174 op=LOAD Apr 12 18:43:53.261000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003c8148 items=0 ppid=3461 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613331376132656530303962613461386333376361313261373336 Apr 12 18:43:53.261000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:43:53.261000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.261000 audit: BPF prog-id=175 op=LOAD Apr 12 18:43:53.261000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c8558 items=0 ppid=3461 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613331376132656530303962613461386333376361313261373336 Apr 12 18:43:53.332102 env[1160]: time="2024-04-12T18:43:53.332074829Z" level=info msg="StartContainer for \"e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477\" returns successfully" Apr 12 18:43:53.806105 kubelet[2145]: I0412 18:43:53.806072 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6b689475f8-rtdhx" podStartSLOduration=27.296268653 podStartE2EDuration="31.806048158s" podCreationTimestamp="2024-04-12 18:43:22 +0000 UTC" firstStartedPulling="2024-04-12 18:43:48.654205361 +0000 UTC m=+46.102135624" lastFinishedPulling="2024-04-12 18:43:53.163984862 +0000 UTC m=+50.611915129" observedRunningTime="2024-04-12 18:43:53.805826687 +0000 UTC m=+51.253756956" watchObservedRunningTime="2024-04-12 18:43:53.806048158 +0000 UTC m=+51.253978427" Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.791114 kernel: kauditd_printk_skb: 468 callbacks suppressed Apr 12 18:43:54.791156 kernel: audit: type=1400 audit(1712947434.788:1261): avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.795848 kernel: audit: type=1400 audit(1712947434.788:1261): avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.796645 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:43:54.796672 kernel: audit: audit_lost=35 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:43:54.797954 kernel: audit: backlog limit exceeded Apr 12 18:43:54.797991 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:43:54.798627 kernel: audit: audit_lost=36 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:43:54.799582 kernel: audit: backlog limit exceeded Apr 12 18:43:54.800739 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:43:54.800768 kernel: audit: audit_lost=37 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit: BPF prog-id=176 op=LOAD Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc347cb9f0 a2=70 a3=7f65f96c4000 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit: BPF prog-id=177 op=LOAD Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc347cb9f0 a2=70 a3=6f items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc347cb9a0 a2=70 a3=7ffc347cb9f0 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit: BPF prog-id=178 op=LOAD Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc347cb980 a2=70 a3=7ffc347cb9f0 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc347cba60 a2=70 a3=0 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc347cba50 a2=70 a3=0 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc347cb9c0 a2=70 a3=0 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.788000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.788000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc347cba90 a2=70 a3=1798e10 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.795000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.795000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc347cba90 a2=70 a3=1795880 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.795000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.795000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.795000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.795000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.795000 audit: BPF prog-id=179 op=LOAD Apr 12 18:43:54.795000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc347cb9b0 a2=70 a3=0 items=0 ppid=4065 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.795000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:54.804000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.804000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeff892b0 a2=70 a3=fff80800 items=0 ppid=4065 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.804000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:43:54.805000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:54.805000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeff89180 a2=70 a3=3 items=0 ppid=4065 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:43:54.809000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:43:54.809000 audit[4128]: SYSCALL arch=c000003e syscall=262 success=yes exit=0 a0=e a1=7f9818910c75 a2=7ffcc87e7530 a3=1000 items=0 ppid=1057 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.809000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:43:54.884000 audit[4159]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:54.884000 audit[4159]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe7d032320 a2=0 a3=7ffe7d03230c items=0 ppid=4065 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.884000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:54.889000 audit[4158]: NETFILTER_CFG table=raw:106 family=2 entries=19 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:54.889000 audit[4158]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe539c38b0 a2=0 a3=7ffe539c389c items=0 ppid=4065 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.889000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:54.897000 audit[4164]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=4164 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:54.897000 audit[4164]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffecad58440 a2=0 a3=7ffecad5842c items=0 ppid=4065 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:54.898000 audit[4161]: NETFILTER_CFG table=filter:108 family=2 entries=157 op=nft_register_chain pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:54.898000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=89076 a0=3 a1=7ffd3342a860 a2=0 a3=7ffd3342a84c items=0 ppid=4065 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:54.898000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:55.141487 systemd-networkd[1067]: vxlan.calico: Link UP Apr 12 18:43:55.141492 systemd-networkd[1067]: vxlan.calico: Gained carrier Apr 12 18:43:55.451950 env[1160]: time="2024-04-12T18:43:55.451880927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:55.453248 env[1160]: time="2024-04-12T18:43:55.453230125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:55.454217 env[1160]: time="2024-04-12T18:43:55.454201674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:55.455157 env[1160]: time="2024-04-12T18:43:55.455142226Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:55.455378 env[1160]: time="2024-04-12T18:43:55.455360287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:43:55.457778 env[1160]: time="2024-04-12T18:43:55.457762244Z" level=info msg="CreateContainer within sandbox \"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:43:55.467211 env[1160]: time="2024-04-12T18:43:55.467188065Z" level=info msg="CreateContainer within sandbox \"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"89039b81af002591f003ea91ce0826aa224bfc9373f0b841509e9bcc22846b58\"" Apr 12 18:43:55.468225 env[1160]: time="2024-04-12T18:43:55.468189691Z" level=info msg="StartContainer for \"89039b81af002591f003ea91ce0826aa224bfc9373f0b841509e9bcc22846b58\"" Apr 12 18:43:55.483986 systemd[1]: Started cri-containerd-89039b81af002591f003ea91ce0826aa224bfc9373f0b841509e9bcc22846b58.scope. Apr 12 18:43:55.487236 systemd[1]: run-containerd-runc-k8s.io-89039b81af002591f003ea91ce0826aa224bfc9373f0b841509e9bcc22846b58-runc.a99RWs.mount: Deactivated successfully. Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f91385f26a8 items=0 ppid=3444 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:55.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303339623831616630303235393166303033656139316365303832 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.498000 audit: BPF prog-id=180 op=LOAD Apr 12 18:43:55.498000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032de88 items=0 ppid=3444 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:55.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303339623831616630303235393166303033656139316365303832 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit: BPF prog-id=181 op=LOAD Apr 12 18:43:55.499000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032ded8 items=0 ppid=3444 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:55.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303339623831616630303235393166303033656139316365303832 Apr 12 18:43:55.499000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:43:55.499000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:55.499000 audit: BPF prog-id=182 op=LOAD Apr 12 18:43:55.499000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00032df68 items=0 ppid=3444 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:55.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303339623831616630303235393166303033656139316365303832 Apr 12 18:43:55.513208 env[1160]: time="2024-04-12T18:43:55.513183864Z" level=info msg="StartContainer for \"89039b81af002591f003ea91ce0826aa224bfc9373f0b841509e9bcc22846b58\" returns successfully" Apr 12 18:43:55.764895 kubelet[2145]: I0412 18:43:55.764828 2145 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:43:55.766586 kubelet[2145]: I0412 18:43:55.766573 2145 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:43:56.338000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:56.338000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:56.338000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a0db90 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:56.338000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:56.338000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0001ce020 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:43:56.338000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:56.726765 systemd-networkd[1067]: vxlan.calico: Gained IPv6LL Apr 12 18:43:59.365000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:59.365000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00536ee10 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:43:59.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:43:59.365000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:59.365000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c006be7710 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:43:59.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:43:59.366000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:59.366000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006be7740 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:43:59.366000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:43:59.385000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:59.385000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00536ee40 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:43:59.385000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:43:59.385000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:59.385000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c003861c20 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:43:59.385000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:43:59.419000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:59.419000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0043bf340 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:43:59.419000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:02.701128 env[1160]: time="2024-04-12T18:44:02.700878680Z" level=info msg="StopPodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\"" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.849 [WARNING][4236] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tz7j4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27b7d97e-5989-427d-83fb-824c0aaf557b", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7", Pod:"csi-node-driver-tz7j4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9412f90bc2b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.851 [INFO][4236] k8s.go 585: Cleaning up netns ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.851 [INFO][4236] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" iface="eth0" netns="" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.851 [INFO][4236] k8s.go 592: Releasing IP address(es) ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.851 [INFO][4236] utils.go 188: Calico CNI releasing IP address ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.875 [INFO][4242] ipam_plugin.go 415: Releasing address using handleID ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.875 [INFO][4242] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.875 [INFO][4242] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.879 [WARNING][4242] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.879 [INFO][4242] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.880 [INFO][4242] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:02.882810 env[1160]: 2024-04-12 18:44:02.881 [INFO][4236] k8s.go 598: Teardown processing complete. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.883252 env[1160]: time="2024-04-12T18:44:02.883230189Z" level=info msg="TearDown network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" successfully" Apr 12 18:44:02.883691 env[1160]: time="2024-04-12T18:44:02.883404333Z" level=info msg="StopPodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" returns successfully" Apr 12 18:44:02.883878 env[1160]: time="2024-04-12T18:44:02.883865581Z" level=info msg="RemovePodSandbox for \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\"" Apr 12 18:44:02.883989 env[1160]: time="2024-04-12T18:44:02.883944368Z" level=info msg="Forcibly stopping sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\"" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.906 [WARNING][4262] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tz7j4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"27b7d97e-5989-427d-83fb-824c0aaf557b", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7f75ad25a393587868d22ffce981debe336c402d02f876db9a371ecdfd32ba7", Pod:"csi-node-driver-tz7j4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9412f90bc2b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.906 [INFO][4262] k8s.go 585: Cleaning up netns ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.906 [INFO][4262] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" iface="eth0" netns="" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.906 [INFO][4262] k8s.go 592: Releasing IP address(es) ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.906 [INFO][4262] utils.go 188: Calico CNI releasing IP address ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.919 [INFO][4268] ipam_plugin.go 415: Releasing address using handleID ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.919 [INFO][4268] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.919 [INFO][4268] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.923 [WARNING][4268] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.923 [INFO][4268] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" HandleID="k8s-pod-network.c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Workload="localhost-k8s-csi--node--driver--tz7j4-eth0" Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.924 [INFO][4268] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:02.926799 env[1160]: 2024-04-12 18:44:02.925 [INFO][4262] k8s.go 598: Teardown processing complete. ContainerID="c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b" Apr 12 18:44:02.927473 env[1160]: time="2024-04-12T18:44:02.927450624Z" level=info msg="TearDown network for sandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" successfully" Apr 12 18:44:02.928994 env[1160]: time="2024-04-12T18:44:02.928979939Z" level=info msg="RemovePodSandbox \"c631d20274dab5f1166cff838f790469c4129ec0f3aff0541fa0bacb930f7d9b\" returns successfully" Apr 12 18:44:02.929459 env[1160]: time="2024-04-12T18:44:02.929447322Z" level=info msg="StopPodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\"" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.952 [WARNING][4288] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0", GenerateName:"calico-kube-controllers-6b689475f8-", Namespace:"calico-system", SelfLink:"", UID:"47287052-b669-47a1-b443-c190dc2a920a", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b689475f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646", Pod:"calico-kube-controllers-6b689475f8-rtdhx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieae516a8de9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.953 [INFO][4288] k8s.go 585: Cleaning up netns ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.953 [INFO][4288] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" iface="eth0" netns="" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.953 [INFO][4288] k8s.go 592: Releasing IP address(es) ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.953 [INFO][4288] utils.go 188: Calico CNI releasing IP address ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.966 [INFO][4295] ipam_plugin.go 415: Releasing address using handleID ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.966 [INFO][4295] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.967 [INFO][4295] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.970 [WARNING][4295] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.970 [INFO][4295] ipam_plugin.go 443: Releasing address using workloadID ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.971 [INFO][4295] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:02.973663 env[1160]: 2024-04-12 18:44:02.972 [INFO][4288] k8s.go 598: Teardown processing complete. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:02.973663 env[1160]: time="2024-04-12T18:44:02.972969759Z" level=info msg="TearDown network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" successfully" Apr 12 18:44:02.973663 env[1160]: time="2024-04-12T18:44:02.972992693Z" level=info msg="StopPodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" returns successfully" Apr 12 18:44:02.974207 env[1160]: time="2024-04-12T18:44:02.974186953Z" level=info msg="RemovePodSandbox for \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\"" Apr 12 18:44:02.974284 env[1160]: time="2024-04-12T18:44:02.974258731Z" level=info msg="Forcibly stopping sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\"" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:02.995 [WARNING][4313] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0", GenerateName:"calico-kube-controllers-6b689475f8-", Namespace:"calico-system", SelfLink:"", UID:"47287052-b669-47a1-b443-c190dc2a920a", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b689475f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"90ec694847966d73c783cfdf2fb5b324acc62ac0acbaace96c2f63fbe9a9a646", Pod:"calico-kube-controllers-6b689475f8-rtdhx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieae516a8de9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:02.995 [INFO][4313] k8s.go 585: Cleaning up netns ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:02.995 [INFO][4313] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" iface="eth0" netns="" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:02.995 [INFO][4313] k8s.go 592: Releasing IP address(es) ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:02.995 [INFO][4313] utils.go 188: Calico CNI releasing IP address ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.007 [INFO][4319] ipam_plugin.go 415: Releasing address using handleID ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.007 [INFO][4319] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.008 [INFO][4319] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.011 [WARNING][4319] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.011 [INFO][4319] ipam_plugin.go 443: Releasing address using workloadID ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" HandleID="k8s-pod-network.136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Workload="localhost-k8s-calico--kube--controllers--6b689475f8--rtdhx-eth0" Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.012 [INFO][4319] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:03.014491 env[1160]: 2024-04-12 18:44:03.013 [INFO][4313] k8s.go 598: Teardown processing complete. ContainerID="136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576" Apr 12 18:44:03.014878 env[1160]: time="2024-04-12T18:44:03.014509886Z" level=info msg="TearDown network for sandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" successfully" Apr 12 18:44:03.021392 env[1160]: time="2024-04-12T18:44:03.021374134Z" level=info msg="RemovePodSandbox \"136d5f9c141daa16e2175bdbe3c06b7f25ec088af795a6833e1346d53a3e6576\" returns successfully" Apr 12 18:44:03.021742 env[1160]: time="2024-04-12T18:44:03.021728585Z" level=info msg="StopPodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\"" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.047 [WARNING][4338] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--bzmbp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"80613424-34c1-468f-ad23-dca75b8ce3ac", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f", Pod:"coredns-76f75df574-bzmbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied0f77100e4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.048 [INFO][4338] k8s.go 585: Cleaning up netns ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.048 [INFO][4338] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" iface="eth0" netns="" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.048 [INFO][4338] k8s.go 592: Releasing IP address(es) ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.048 [INFO][4338] utils.go 188: Calico CNI releasing IP address ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.060 [INFO][4344] ipam_plugin.go 415: Releasing address using handleID ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.060 [INFO][4344] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.060 [INFO][4344] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.064 [WARNING][4344] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.064 [INFO][4344] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.064 [INFO][4344] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:03.067108 env[1160]: 2024-04-12 18:44:03.065 [INFO][4338] k8s.go 598: Teardown processing complete. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.067829 env[1160]: time="2024-04-12T18:44:03.067126593Z" level=info msg="TearDown network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" successfully" Apr 12 18:44:03.067829 env[1160]: time="2024-04-12T18:44:03.067146780Z" level=info msg="StopPodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" returns successfully" Apr 12 18:44:03.067829 env[1160]: time="2024-04-12T18:44:03.067596286Z" level=info msg="RemovePodSandbox for \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\"" Apr 12 18:44:03.067829 env[1160]: time="2024-04-12T18:44:03.067622449Z" level=info msg="Forcibly stopping sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\"" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.089 [WARNING][4362] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--bzmbp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"80613424-34c1-468f-ad23-dca75b8ce3ac", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"02898ddac3ccb4521e4f82fc96660bd8c01c7c6388d34d0d999778485de5574f", Pod:"coredns-76f75df574-bzmbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied0f77100e4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.090 [INFO][4362] k8s.go 585: Cleaning up netns ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.090 [INFO][4362] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" iface="eth0" netns="" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.090 [INFO][4362] k8s.go 592: Releasing IP address(es) ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.090 [INFO][4362] utils.go 188: Calico CNI releasing IP address ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.103 [INFO][4368] ipam_plugin.go 415: Releasing address using handleID ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.103 [INFO][4368] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.103 [INFO][4368] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.107 [WARNING][4368] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.107 [INFO][4368] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" HandleID="k8s-pod-network.5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Workload="localhost-k8s-coredns--76f75df574--bzmbp-eth0" Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.108 [INFO][4368] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:03.114603 env[1160]: 2024-04-12 18:44:03.113 [INFO][4362] k8s.go 598: Teardown processing complete. ContainerID="5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc" Apr 12 18:44:03.115019 env[1160]: time="2024-04-12T18:44:03.114997374Z" level=info msg="TearDown network for sandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" successfully" Apr 12 18:44:03.116511 env[1160]: time="2024-04-12T18:44:03.116498073Z" level=info msg="RemovePodSandbox \"5676c1ac58cbb519143ee83804eed1925c79a496229a9fbf26028a4e33c3e6bc\" returns successfully" Apr 12 18:44:03.116950 env[1160]: time="2024-04-12T18:44:03.116895402Z" level=info msg="StopPodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\"" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.161 [WARNING][4386] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--sdm9s-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4a8d6a00-5e14-44e4-ac13-3b10d879597b", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6", Pod:"coredns-76f75df574-sdm9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bc2dcf420", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.161 [INFO][4386] k8s.go 585: Cleaning up netns ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.161 [INFO][4386] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" iface="eth0" netns="" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.161 [INFO][4386] k8s.go 592: Releasing IP address(es) ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.161 [INFO][4386] utils.go 188: Calico CNI releasing IP address ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.174 [INFO][4392] ipam_plugin.go 415: Releasing address using handleID ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.174 [INFO][4392] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.174 [INFO][4392] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.177 [WARNING][4392] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.177 [INFO][4392] ipam_plugin.go 443: Releasing address using workloadID ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.178 [INFO][4392] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:03.180389 env[1160]: 2024-04-12 18:44:03.179 [INFO][4386] k8s.go 598: Teardown processing complete. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.194008 env[1160]: time="2024-04-12T18:44:03.180408922Z" level=info msg="TearDown network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" successfully" Apr 12 18:44:03.194008 env[1160]: time="2024-04-12T18:44:03.180429048Z" level=info msg="StopPodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" returns successfully" Apr 12 18:44:03.194008 env[1160]: time="2024-04-12T18:44:03.180824021Z" level=info msg="RemovePodSandbox for \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\"" Apr 12 18:44:03.194008 env[1160]: time="2024-04-12T18:44:03.180844754Z" level=info msg="Forcibly stopping sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\"" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.200 [WARNING][4410] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--sdm9s-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4a8d6a00-5e14-44e4-ac13-3b10d879597b", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9a2b53d950c87928b1f5cef8d1fcac27482faf95b63d540150e254ea918bfeb6", Pod:"coredns-76f75df574-sdm9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bc2dcf420", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.200 [INFO][4410] k8s.go 585: Cleaning up netns ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.200 [INFO][4410] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" iface="eth0" netns="" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.200 [INFO][4410] k8s.go 592: Releasing IP address(es) ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.200 [INFO][4410] utils.go 188: Calico CNI releasing IP address ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.212 [INFO][4416] ipam_plugin.go 415: Releasing address using handleID ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.212 [INFO][4416] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.212 [INFO][4416] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.218 [WARNING][4416] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.218 [INFO][4416] ipam_plugin.go 443: Releasing address using workloadID ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" HandleID="k8s-pod-network.16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Workload="localhost-k8s-coredns--76f75df574--sdm9s-eth0" Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.219 [INFO][4416] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:03.241663 env[1160]: 2024-04-12 18:44:03.239 [INFO][4410] k8s.go 598: Teardown processing complete. ContainerID="16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c" Apr 12 18:44:03.241663 env[1160]: time="2024-04-12T18:44:03.240419795Z" level=info msg="TearDown network for sandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" successfully" Apr 12 18:44:03.262922 env[1160]: time="2024-04-12T18:44:03.262896129Z" level=info msg="RemovePodSandbox \"16aa6999aaa1d6a8084d447a506660234aec456edd45f176a21ccf675b302b1c\" returns successfully" Apr 12 18:44:03.921177 systemd[1]: run-containerd-runc-k8s.io-e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477-runc.7pE1sF.mount: Deactivated successfully. Apr 12 18:44:14.287565 kernel: kauditd_printk_skb: 162 callbacks suppressed Apr 12 18:44:14.287675 kernel: audit: type=1400 audit(1712947454.285:1295): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.285000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.285000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d2a2a0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.296165 kernel: audit: type=1300 audit(1712947454.285:1295): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d2a2a0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.296204 kernel: audit: type=1327 audit(1712947454.285:1295): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:14.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:14.286000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.303768 kernel: audit: type=1400 audit(1712947454.286:1296): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.303817 kernel: audit: type=1300 audit(1712947454.286:1296): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d2a2e0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.286000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d2a2e0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.286000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:14.312651 kernel: audit: type=1327 audit(1712947454.286:1296): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:14.312698 kernel: audit: type=1400 audit(1712947454.293:1297): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.293000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.293000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d2a660 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.321143 kernel: audit: type=1300 audit(1712947454.293:1297): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d2a660 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.321191 kernel: audit: type=1327 audit(1712947454.293:1297): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:14.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:14.293000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.328817 kernel: audit: type=1400 audit(1712947454.293:1298): avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:14.293000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e755a0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:14.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:20.483863 systemd[1]: run-containerd-runc-k8s.io-f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771-runc.Gon3To.mount: Deactivated successfully. Apr 12 18:44:20.530577 kubelet[2145]: I0412 18:44:20.530552 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-tz7j4" podStartSLOduration=51.728574319 podStartE2EDuration="58.530507051s" podCreationTimestamp="2024-04-12 18:43:22 +0000 UTC" firstStartedPulling="2024-04-12 18:43:48.653991059 +0000 UTC m=+46.101921325" lastFinishedPulling="2024-04-12 18:43:55.455923788 +0000 UTC m=+52.903854057" observedRunningTime="2024-04-12 18:43:55.826405347 +0000 UTC m=+53.274335623" watchObservedRunningTime="2024-04-12 18:44:20.530507051 +0000 UTC m=+77.978437320" Apr 12 18:44:22.356000 audit[4496]: NETFILTER_CFG table=filter:109 family=2 entries=9 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.358600 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:44:22.358639 kernel: audit: type=1325 audit(1712947462.356:1299): table=filter:109 family=2 entries=9 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.356000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd793944a0 a2=0 a3=7ffd7939448c items=0 ppid=2276 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.366424 kernel: audit: type=1300 audit(1712947462.356:1299): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd793944a0 a2=0 a3=7ffd7939448c items=0 ppid=2276 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.366462 kernel: audit: type=1327 audit(1712947462.356:1299): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.359000 audit[4496]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.359000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd793944a0 a2=0 a3=7ffd7939448c items=0 ppid=2276 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.372534 kernel: audit: type=1325 audit(1712947462.359:1300): table=nat:110 family=2 entries=20 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.372590 kernel: audit: type=1300 audit(1712947462.359:1300): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd793944a0 a2=0 a3=7ffd7939448c items=0 ppid=2276 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.372609 kernel: audit: type=1327 audit(1712947462.359:1300): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.375813 kubelet[2145]: I0412 18:44:22.375793 2145 topology_manager.go:215] "Topology Admit Handler" podUID="45b191bb-c767-481c-8143-224898a4fcf1" podNamespace="calico-apiserver" podName="calico-apiserver-7545cf7758-clvtt" Apr 12 18:44:22.379411 kubelet[2145]: I0412 18:44:22.379400 2145 topology_manager.go:215] "Topology Admit Handler" podUID="d5dfb114-6eff-442a-9e89-198f3addfebe" podNamespace="calico-apiserver" podName="calico-apiserver-7545cf7758-47bsx" Apr 12 18:44:22.379681 systemd[1]: Created slice kubepods-besteffort-pod45b191bb_c767_481c_8143_224898a4fcf1.slice. Apr 12 18:44:22.386899 systemd[1]: Created slice kubepods-besteffort-podd5dfb114_6eff_442a_9e89_198f3addfebe.slice. Apr 12 18:44:22.390000 audit[4498]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.390000 audit[4498]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd45e570f0 a2=0 a3=7ffd45e570dc items=0 ppid=2276 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.398060 kernel: audit: type=1325 audit(1712947462.390:1301): table=filter:111 family=2 entries=10 op=nft_register_rule pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.398108 kernel: audit: type=1300 audit(1712947462.390:1301): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd45e570f0 a2=0 a3=7ffd45e570dc items=0 ppid=2276 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.400553 kernel: audit: type=1327 audit(1712947462.390:1301): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.391000 audit[4498]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.391000 audit[4498]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd45e570f0 a2=0 a3=7ffd45e570dc items=0 ppid=2276 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:22.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:22.404563 kernel: audit: type=1325 audit(1712947462.391:1302): table=nat:112 family=2 entries=20 op=nft_register_rule pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:22.475498 kubelet[2145]: I0412 18:44:22.475473 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/45b191bb-c767-481c-8143-224898a4fcf1-calico-apiserver-certs\") pod \"calico-apiserver-7545cf7758-clvtt\" (UID: \"45b191bb-c767-481c-8143-224898a4fcf1\") " pod="calico-apiserver/calico-apiserver-7545cf7758-clvtt" Apr 12 18:44:22.475669 kubelet[2145]: I0412 18:44:22.475658 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8l56s\" (UniqueName: \"kubernetes.io/projected/45b191bb-c767-481c-8143-224898a4fcf1-kube-api-access-8l56s\") pod \"calico-apiserver-7545cf7758-clvtt\" (UID: \"45b191bb-c767-481c-8143-224898a4fcf1\") " pod="calico-apiserver/calico-apiserver-7545cf7758-clvtt" Apr 12 18:44:22.475768 kubelet[2145]: I0412 18:44:22.475756 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d5dfb114-6eff-442a-9e89-198f3addfebe-calico-apiserver-certs\") pod \"calico-apiserver-7545cf7758-47bsx\" (UID: \"d5dfb114-6eff-442a-9e89-198f3addfebe\") " pod="calico-apiserver/calico-apiserver-7545cf7758-47bsx" Apr 12 18:44:22.475862 kubelet[2145]: I0412 18:44:22.475853 2145 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r6kbn\" (UniqueName: \"kubernetes.io/projected/d5dfb114-6eff-442a-9e89-198f3addfebe-kube-api-access-r6kbn\") pod \"calico-apiserver-7545cf7758-47bsx\" (UID: \"d5dfb114-6eff-442a-9e89-198f3addfebe\") " pod="calico-apiserver/calico-apiserver-7545cf7758-47bsx" Apr 12 18:44:22.577763 kubelet[2145]: E0412 18:44:22.577738 2145 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:44:22.577936 kubelet[2145]: E0412 18:44:22.577923 2145 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d5dfb114-6eff-442a-9e89-198f3addfebe-calico-apiserver-certs podName:d5dfb114-6eff-442a-9e89-198f3addfebe nodeName:}" failed. No retries permitted until 2024-04-12 18:44:23.077906243 +0000 UTC m=+80.525836516 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d5dfb114-6eff-442a-9e89-198f3addfebe-calico-apiserver-certs") pod "calico-apiserver-7545cf7758-47bsx" (UID: "d5dfb114-6eff-442a-9e89-198f3addfebe") : secret "calico-apiserver-certs" not found Apr 12 18:44:22.578450 kubelet[2145]: E0412 18:44:22.578438 2145 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:44:22.578565 kubelet[2145]: E0412 18:44:22.578554 2145 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/45b191bb-c767-481c-8143-224898a4fcf1-calico-apiserver-certs podName:45b191bb-c767-481c-8143-224898a4fcf1 nodeName:}" failed. No retries permitted until 2024-04-12 18:44:23.078528444 +0000 UTC m=+80.526458715 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/45b191bb-c767-481c-8143-224898a4fcf1-calico-apiserver-certs") pod "calico-apiserver-7545cf7758-clvtt" (UID: "45b191bb-c767-481c-8143-224898a4fcf1") : secret "calico-apiserver-certs" not found Apr 12 18:44:23.283126 env[1160]: time="2024-04-12T18:44:23.283088593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7545cf7758-clvtt,Uid:45b191bb-c767-481c-8143-224898a4fcf1,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:44:23.294451 env[1160]: time="2024-04-12T18:44:23.294132000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7545cf7758-47bsx,Uid:d5dfb114-6eff-442a-9e89-198f3addfebe,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:44:23.392666 systemd-networkd[1067]: cali3e96e8d0261: Link UP Apr 12 18:44:23.394718 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:44:23.394769 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e96e8d0261: link becomes ready Apr 12 18:44:23.394697 systemd-networkd[1067]: cali3e96e8d0261: Gained carrier Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.338 [INFO][4503] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0 calico-apiserver-7545cf7758- calico-apiserver 45b191bb-c767-481c-8143-224898a4fcf1 890 0 2024-04-12 18:44:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7545cf7758 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7545cf7758-clvtt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3e96e8d0261 [] []}} ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.338 [INFO][4503] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.365 [INFO][4527] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" HandleID="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Workload="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.371 [INFO][4527] ipam_plugin.go 268: Auto assigning IP ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" HandleID="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Workload="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002755d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7545cf7758-clvtt", "timestamp":"2024-04-12 18:44:23.36549633 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.371 [INFO][4527] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.371 [INFO][4527] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.371 [INFO][4527] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.373 [INFO][4527] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.375 [INFO][4527] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.376 [INFO][4527] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.377 [INFO][4527] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.378 [INFO][4527] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.378 [INFO][4527] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.379 [INFO][4527] ipam.go 1682: Creating new handle: k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.380 [INFO][4527] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.384 [INFO][4527] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.384 [INFO][4527] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" host="localhost" Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.384 [INFO][4527] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:23.405921 env[1160]: 2024-04-12 18:44:23.384 [INFO][4527] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" HandleID="k8s-pod-network.45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Workload="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.406512 env[1160]: 2024-04-12 18:44:23.386 [INFO][4503] k8s.go 385: Populated endpoint ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0", GenerateName:"calico-apiserver-7545cf7758-", Namespace:"calico-apiserver", SelfLink:"", UID:"45b191bb-c767-481c-8143-224898a4fcf1", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7545cf7758", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7545cf7758-clvtt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3e96e8d0261", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:23.406512 env[1160]: 2024-04-12 18:44:23.386 [INFO][4503] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.406512 env[1160]: 2024-04-12 18:44:23.386 [INFO][4503] dataplane_linux.go 68: Setting the host side veth name to cali3e96e8d0261 ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.406512 env[1160]: 2024-04-12 18:44:23.396 [INFO][4503] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.406512 env[1160]: 2024-04-12 18:44:23.396 [INFO][4503] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0", GenerateName:"calico-apiserver-7545cf7758-", Namespace:"calico-apiserver", SelfLink:"", UID:"45b191bb-c767-481c-8143-224898a4fcf1", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7545cf7758", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db", Pod:"calico-apiserver-7545cf7758-clvtt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3e96e8d0261", MAC:"0a:38:43:c5:ca:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:23.406512 env[1160]: 2024-04-12 18:44:23.402 [INFO][4503] k8s.go 498: Wrote updated endpoint to datastore ContainerID="45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-clvtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--clvtt-eth0" Apr 12 18:44:23.434000 audit[4570]: NETFILTER_CFG table=filter:113 family=2 entries=55 op=nft_register_chain pid=4570 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:23.434000 audit[4570]: SYSCALL arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7ffdc413db30 a2=0 a3=7ffdc413db1c items=0 ppid=4065 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.434000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:23.439291 env[1160]: time="2024-04-12T18:44:23.439238486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:23.439347 systemd-networkd[1067]: cali5bee7adae58: Link UP Apr 12 18:44:23.439514 env[1160]: time="2024-04-12T18:44:23.439497377Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:23.439608 env[1160]: time="2024-04-12T18:44:23.439593308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:23.439825 env[1160]: time="2024-04-12T18:44:23.439804365Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db pid=4564 runtime=io.containerd.runc.v2 Apr 12 18:44:23.440815 systemd-networkd[1067]: cali5bee7adae58: Gained carrier Apr 12 18:44:23.441591 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5bee7adae58: link becomes ready Apr 12 18:44:23.448086 systemd[1]: Started cri-containerd-45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db.scope. Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.338 [INFO][4509] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0 calico-apiserver-7545cf7758- calico-apiserver d5dfb114-6eff-442a-9e89-198f3addfebe 891 0 2024-04-12 18:44:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7545cf7758 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7545cf7758-47bsx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5bee7adae58 [] []}} ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.338 [INFO][4509] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.365 [INFO][4528] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" HandleID="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Workload="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.373 [INFO][4528] ipam_plugin.go 268: Auto assigning IP ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" HandleID="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Workload="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029c8a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7545cf7758-47bsx", "timestamp":"2024-04-12 18:44:23.36551417 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.373 [INFO][4528] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.385 [INFO][4528] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.386 [INFO][4528] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.388 [INFO][4528] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.396 [INFO][4528] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.402 [INFO][4528] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.403 [INFO][4528] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.405 [INFO][4528] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.405 [INFO][4528] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.407 [INFO][4528] ipam.go 1682: Creating new handle: k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922 Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.420 [INFO][4528] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.425 [INFO][4528] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.425 [INFO][4528] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" host="localhost" Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.425 [INFO][4528] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:23.453816 env[1160]: 2024-04-12 18:44:23.425 [INFO][4528] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" HandleID="k8s-pod-network.e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Workload="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.454290 env[1160]: 2024-04-12 18:44:23.427 [INFO][4509] k8s.go 385: Populated endpoint ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0", GenerateName:"calico-apiserver-7545cf7758-", Namespace:"calico-apiserver", SelfLink:"", UID:"d5dfb114-6eff-442a-9e89-198f3addfebe", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7545cf7758", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7545cf7758-47bsx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bee7adae58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:23.454290 env[1160]: 2024-04-12 18:44:23.427 [INFO][4509] k8s.go 386: Calico CNI using IPs: [192.168.88.134/32] ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.454290 env[1160]: 2024-04-12 18:44:23.427 [INFO][4509] dataplane_linux.go 68: Setting the host side veth name to cali5bee7adae58 ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.454290 env[1160]: 2024-04-12 18:44:23.441 [INFO][4509] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.454290 env[1160]: 2024-04-12 18:44:23.441 [INFO][4509] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0", GenerateName:"calico-apiserver-7545cf7758-", Namespace:"calico-apiserver", SelfLink:"", UID:"d5dfb114-6eff-442a-9e89-198f3addfebe", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7545cf7758", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922", Pod:"calico-apiserver-7545cf7758-47bsx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5bee7adae58", MAC:"12:da:cf:6b:b2:9e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:23.454290 env[1160]: 2024-04-12 18:44:23.451 [INFO][4509] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922" Namespace="calico-apiserver" Pod="calico-apiserver-7545cf7758-47bsx" WorkloadEndpoint="localhost-k8s-calico--apiserver--7545cf7758--47bsx-eth0" Apr 12 18:44:23.465378 env[1160]: time="2024-04-12T18:44:23.465110171Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:23.465488 env[1160]: time="2024-04-12T18:44:23.465373172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:23.465488 env[1160]: time="2024-04-12T18:44:23.465382927Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:23.465679 env[1160]: time="2024-04-12T18:44:23.465646318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922 pid=4606 runtime=io.containerd.runc.v2 Apr 12 18:44:23.472497 systemd[1]: Started cri-containerd-e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922.scope. Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit: BPF prog-id=183 op=LOAD Apr 12 18:44:23.475000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.475000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4564 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633434366539643065303764313136633137323661613537626233 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4564 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633434366539643065303764313136633137323661613537626233 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit: BPF prog-id=184 op=LOAD Apr 12 18:44:23.476000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f1d0 items=0 ppid=4564 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633434366539643065303764313136633137323661613537626233 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit: BPF prog-id=185 op=LOAD Apr 12 18:44:23.476000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028f218 items=0 ppid=4564 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633434366539643065303764313136633137323661613537626233 Apr 12 18:44:23.476000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:44:23.476000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.476000 audit: BPF prog-id=186 op=LOAD Apr 12 18:44:23.476000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f628 items=0 ppid=4564 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435633434366539643065303764313136633137323661613537626233 Apr 12 18:44:23.481039 systemd-resolved[1107]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:23.505000 audit[4641]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:23.505000 audit[4641]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffff25c6f30 a2=0 a3=7ffff25c6f1c items=0 ppid=4065 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.505000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.508000 audit: BPF prog-id=187 op=LOAD Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536626561336431653963363735323463306530386232323330393639 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536626561336431653963363735323463306530386232323330393639 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit: BPF prog-id=188 op=LOAD Apr 12 18:44:23.509000 audit[4616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00029f200 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536626561336431653963363735323463306530386232323330393639 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.509000 audit: BPF prog-id=189 op=LOAD Apr 12 18:44:23.509000 audit[4616]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00029f248 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536626561336431653963363735323463306530386232323330393639 Apr 12 18:44:23.510000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:44:23.510000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { perfmon } for pid=4616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit[4616]: AVC avc: denied { bpf } for pid=4616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:23.510000 audit: BPF prog-id=190 op=LOAD Apr 12 18:44:23.510000 audit[4616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00029f658 items=0 ppid=4606 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:23.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536626561336431653963363735323463306530386232323330393639 Apr 12 18:44:23.512963 systemd-resolved[1107]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:23.528403 env[1160]: time="2024-04-12T18:44:23.528380153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7545cf7758-clvtt,Uid:45b191bb-c767-481c-8143-224898a4fcf1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db\"" Apr 12 18:44:23.529218 env[1160]: time="2024-04-12T18:44:23.529205831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:44:23.538791 env[1160]: time="2024-04-12T18:44:23.538731070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7545cf7758-47bsx,Uid:d5dfb114-6eff-442a-9e89-198f3addfebe,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922\"" Apr 12 18:44:23.956930 systemd[1]: run-containerd-runc-k8s.io-e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477-runc.1BUmtO.mount: Deactivated successfully. Apr 12 18:44:24.685716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3869121106.mount: Deactivated successfully. Apr 12 18:44:24.949733 systemd-networkd[1067]: cali3e96e8d0261: Gained IPv6LL Apr 12 18:44:25.397876 systemd-networkd[1067]: cali5bee7adae58: Gained IPv6LL Apr 12 18:44:25.811370 env[1160]: time="2024-04-12T18:44:25.811294979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:25.812090 env[1160]: time="2024-04-12T18:44:25.812073147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:25.812992 env[1160]: time="2024-04-12T18:44:25.812976286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:25.813760 env[1160]: time="2024-04-12T18:44:25.813741059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:25.814150 env[1160]: time="2024-04-12T18:44:25.814129958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:44:25.814751 env[1160]: time="2024-04-12T18:44:25.814729214Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:44:25.815258 env[1160]: time="2024-04-12T18:44:25.815239348Z" level=info msg="CreateContainer within sandbox \"45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:44:25.823999 env[1160]: time="2024-04-12T18:44:25.823975366Z" level=info msg="CreateContainer within sandbox \"45c446e9d0e07d116c1726aa57bb3043aeab37011668037392954dc0accc20db\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57\"" Apr 12 18:44:25.824451 env[1160]: time="2024-04-12T18:44:25.824439698Z" level=info msg="StartContainer for \"3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57\"" Apr 12 18:44:25.851626 systemd[1]: Started cri-containerd-3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57.scope. Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit: BPF prog-id=191 op=LOAD Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4564 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353366393236306634653633303661386138363662643062383663 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4564 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353366393236306634653633303661386138363662643062383663 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit: BPF prog-id=192 op=LOAD Apr 12 18:44:25.857000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031bc50 items=0 ppid=4564 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353366393236306634653633303661386138363662643062383663 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit: BPF prog-id=193 op=LOAD Apr 12 18:44:25.857000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031bc98 items=0 ppid=4564 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353366393236306634653633303661386138363662643062383663 Apr 12 18:44:25.857000 audit: BPF prog-id=193 op=UNLOAD Apr 12 18:44:25.857000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:25.857000 audit: BPF prog-id=194 op=LOAD Apr 12 18:44:25.857000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003660a8 items=0 ppid=4564 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353366393236306634653633303661386138363662643062383663 Apr 12 18:44:25.888311 env[1160]: time="2024-04-12T18:44:25.888287356Z" level=info msg="StartContainer for \"3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57\" returns successfully" Apr 12 18:44:26.157577 env[1160]: time="2024-04-12T18:44:26.157556532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:26.158524 env[1160]: time="2024-04-12T18:44:26.158511897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:26.159643 env[1160]: time="2024-04-12T18:44:26.159631341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:26.160807 env[1160]: time="2024-04-12T18:44:26.160794886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:26.161104 env[1160]: time="2024-04-12T18:44:26.161085188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:44:26.163196 env[1160]: time="2024-04-12T18:44:26.163181390Z" level=info msg="CreateContainer within sandbox \"e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:44:26.168290 env[1160]: time="2024-04-12T18:44:26.168272867Z" level=info msg="CreateContainer within sandbox \"e6bea3d1e9c67524c0e08b2230969c97c0b26011c585a4036fce455005cae922\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"16387963cf7094b95a97e7d80aee271ecab27f78042f6f2e191e39ab4e80d00e\"" Apr 12 18:44:26.171134 env[1160]: time="2024-04-12T18:44:26.171115500Z" level=info msg="StartContainer for \"16387963cf7094b95a97e7d80aee271ecab27f78042f6f2e191e39ab4e80d00e\"" Apr 12 18:44:26.193915 systemd[1]: Started cri-containerd-16387963cf7094b95a97e7d80aee271ecab27f78042f6f2e191e39ab4e80d00e.scope. Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit: BPF prog-id=195 op=LOAD Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4606 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333837393633636637303934623935613937653764383061656532 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4606 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333837393633636637303934623935613937653764383061656532 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit: BPF prog-id=196 op=LOAD Apr 12 18:44:26.208000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383dc0 items=0 ppid=4606 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333837393633636637303934623935613937653764383061656532 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit: BPF prog-id=197 op=LOAD Apr 12 18:44:26.208000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383e08 items=0 ppid=4606 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333837393633636637303934623935613937653764383061656532 Apr 12 18:44:26.208000 audit: BPF prog-id=197 op=UNLOAD Apr 12 18:44:26.208000 audit: BPF prog-id=196 op=UNLOAD Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:26.208000 audit: BPF prog-id=198 op=LOAD Apr 12 18:44:26.208000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e0218 items=0 ppid=4606 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333837393633636637303934623935613937653764383061656532 Apr 12 18:44:26.272151 env[1160]: time="2024-04-12T18:44:26.272125286Z" level=info msg="StartContainer for \"16387963cf7094b95a97e7d80aee271ecab27f78042f6f2e191e39ab4e80d00e\" returns successfully" Apr 12 18:44:26.391000 audit[4698]: AVC avc: denied { watch } for pid=4698 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_44_23.1394506619/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c846 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c140,c846 tclass=file permissive=0 Apr 12 18:44:26.391000 audit[4698]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f66760 a2=fc6 a3=0 items=0 ppid=4564 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c846 key=(null) Apr 12 18:44:26.391000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:44:26.516000 audit[4740]: AVC avc: denied { watch } for pid=4740 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_44_23.2533224258/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c204,c863 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c204,c863 tclass=file permissive=0 Apr 12 18:44:26.516000 audit[4740]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c5f420 a2=fc6 a3=0 items=0 ppid=4606 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c204,c863 key=(null) Apr 12 18:44:26.516000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:44:26.821346 systemd[1]: run-containerd-runc-k8s.io-3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57-runc.VCOnoT.mount: Deactivated successfully. Apr 12 18:44:26.896101 kubelet[2145]: I0412 18:44:26.896082 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7545cf7758-47bsx" podStartSLOduration=2.27642546 podStartE2EDuration="4.896037224s" podCreationTimestamp="2024-04-12 18:44:22 +0000 UTC" firstStartedPulling="2024-04-12 18:44:23.54190245 +0000 UTC m=+80.989832715" lastFinishedPulling="2024-04-12 18:44:26.161514213 +0000 UTC m=+83.609444479" observedRunningTime="2024-04-12 18:44:26.890160568 +0000 UTC m=+84.338090866" watchObservedRunningTime="2024-04-12 18:44:26.896037224 +0000 UTC m=+84.343967492" Apr 12 18:44:26.900000 audit[4766]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:26.900000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdf25e0640 a2=0 a3=7ffdf25e062c items=0 ppid=2276 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:26.900000 audit[4766]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:26.900000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf25e0640 a2=0 a3=7ffdf25e062c items=0 ppid=2276 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:26.910000 audit[4768]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:26.910000 audit[4768]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffb723c2f0 a2=0 a3=7fffb723c2dc items=0 ppid=2276 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:26.910000 audit[4768]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:26.910000 audit[4768]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffb723c2f0 a2=0 a3=7fffb723c2dc items=0 ppid=2276 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:26.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:32.110946 systemd[1]: Started sshd@7-139.178.70.105:22-139.178.89.65:49628.service. Apr 12 18:44:32.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-139.178.89.65:49628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:32.115920 kernel: kauditd_printk_skb: 254 callbacks suppressed Apr 12 18:44:32.115985 kernel: audit: type=1130 audit(1712947472.110:1383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-139.178.89.65:49628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:32.206000 audit[4775]: USER_ACCT pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.211173 sshd[4775]: Accepted publickey for core from 139.178.89.65 port 49628 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:32.212080 kernel: audit: type=1101 audit(1712947472.206:1384): pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.215663 kernel: audit: type=1103 audit(1712947472.212:1385): pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.215690 kernel: audit: type=1006 audit(1712947472.212:1386): pid=4775 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:44:32.212000 audit[4775]: CRED_ACQ pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.220849 kernel: audit: type=1300 audit(1712947472.212:1386): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe091bf5e0 a2=3 a3=0 items=0 ppid=1 pid=4775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:32.212000 audit[4775]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe091bf5e0 a2=3 a3=0 items=0 ppid=1 pid=4775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:32.222546 kernel: audit: type=1327 audit(1712947472.212:1386): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:32.212000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:32.222659 sshd[4775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:32.227279 systemd[1]: Started session-10.scope. Apr 12 18:44:32.227531 systemd-logind[1143]: New session 10 of user core. Apr 12 18:44:32.230000 audit[4775]: USER_START pid=4775 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.235836 kernel: audit: type=1105 audit(1712947472.230:1387): pid=4775 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.235880 kernel: audit: type=1103 audit(1712947472.235:1388): pid=4777 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.235000 audit[4777]: CRED_ACQ pid=4777 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.612708 sshd[4775]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:32.613000 audit[4775]: USER_END pid=4775 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.613000 audit[4775]: CRED_DISP pid=4775 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.618155 systemd[1]: sshd@7-139.178.70.105:22-139.178.89.65:49628.service: Deactivated successfully. Apr 12 18:44:32.618739 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:44:32.621032 kernel: audit: type=1106 audit(1712947472.613:1389): pid=4775 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.621066 kernel: audit: type=1104 audit(1712947472.613:1390): pid=4775 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:32.619676 systemd-logind[1143]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:44:32.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-139.178.89.65:49628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:32.620171 systemd-logind[1143]: Removed session 10. Apr 12 18:44:33.922211 systemd[1]: run-containerd-runc-k8s.io-e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477-runc.HOp3zY.mount: Deactivated successfully. Apr 12 18:44:37.618432 systemd[1]: Started sshd@8-139.178.70.105:22-139.178.89.65:58576.service. Apr 12 18:44:37.622944 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:37.623232 kernel: audit: type=1130 audit(1712947477.618:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-139.178.89.65:58576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:37.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-139.178.89.65:58576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:37.659000 audit[4820]: USER_ACCT pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.661591 sshd[4820]: Accepted publickey for core from 139.178.89.65 port 58576 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:37.663000 audit[4820]: CRED_ACQ pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.664912 sshd[4820]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:37.667776 kernel: audit: type=1101 audit(1712947477.659:1393): pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.667810 kernel: audit: type=1103 audit(1712947477.663:1394): pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.667939 kernel: audit: type=1006 audit(1712947477.664:1395): pid=4820 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:44:37.669870 kernel: audit: type=1300 audit(1712947477.664:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff478401a0 a2=3 a3=0 items=0 ppid=1 pid=4820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:37.664000 audit[4820]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff478401a0 a2=3 a3=0 items=0 ppid=1 pid=4820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:37.664000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:37.674176 kernel: audit: type=1327 audit(1712947477.664:1395): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:37.674821 systemd[1]: Started session-11.scope. Apr 12 18:44:37.675571 systemd-logind[1143]: New session 11 of user core. Apr 12 18:44:37.677000 audit[4820]: USER_START pid=4820 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.678000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.684779 kernel: audit: type=1105 audit(1712947477.677:1396): pid=4820 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.684810 kernel: audit: type=1103 audit(1712947477.678:1397): pid=4822 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.785716 sshd[4820]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:37.786000 audit[4820]: USER_END pid=4820 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.787589 systemd-logind[1143]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:44:37.788516 systemd[1]: sshd@8-139.178.70.105:22-139.178.89.65:58576.service: Deactivated successfully. Apr 12 18:44:37.788952 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:44:37.789800 systemd-logind[1143]: Removed session 11. Apr 12 18:44:37.786000 audit[4820]: CRED_DISP pid=4820 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.793163 kernel: audit: type=1106 audit(1712947477.786:1398): pid=4820 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.793202 kernel: audit: type=1104 audit(1712947477.786:1399): pid=4820 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:37.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-139.178.89.65:58576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.788664 systemd[1]: Started sshd@9-139.178.70.105:22-139.178.89.65:58582.service. Apr 12 18:44:42.790730 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:42.790793 kernel: audit: type=1130 audit(1712947482.788:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-139.178.89.65:58582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-139.178.89.65:58582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.825000 audit[4832]: USER_ACCT pid=4832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.827846 sshd[4832]: Accepted publickey for core from 139.178.89.65 port 58582 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:42.831561 kernel: audit: type=1101 audit(1712947482.825:1402): pid=4832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.831000 audit[4832]: CRED_ACQ pid=4832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.832514 sshd[4832]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:42.838683 kernel: audit: type=1103 audit(1712947482.831:1403): pid=4832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.838720 kernel: audit: type=1006 audit(1712947482.831:1404): pid=4832 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:44:42.831000 audit[4832]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb901f2f0 a2=3 a3=0 items=0 ppid=1 pid=4832 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.842520 kernel: audit: type=1300 audit(1712947482.831:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb901f2f0 a2=3 a3=0 items=0 ppid=1 pid=4832 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:42.845201 kernel: audit: type=1327 audit(1712947482.831:1404): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:42.846208 systemd[1]: Started session-12.scope. Apr 12 18:44:42.846434 systemd-logind[1143]: New session 12 of user core. Apr 12 18:44:42.849000 audit[4832]: USER_START pid=4832 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.849000 audit[4834]: CRED_ACQ pid=4834 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.856140 kernel: audit: type=1105 audit(1712947482.849:1405): pid=4832 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.856187 kernel: audit: type=1103 audit(1712947482.849:1406): pid=4834 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.984719 sshd[4832]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:42.985000 audit[4832]: USER_END pid=4832 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.986818 systemd[1]: Started sshd@10-139.178.70.105:22-139.178.89.65:58586.service. Apr 12 18:44:42.990000 audit[4832]: CRED_DISP pid=4832 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.994556 kernel: audit: type=1106 audit(1712947482.985:1407): pid=4832 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.994780 kernel: audit: type=1104 audit(1712947482.990:1408): pid=4832 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:42.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-139.178.89.65:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-139.178.89.65:58582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.995587 systemd[1]: sshd@9-139.178.70.105:22-139.178.89.65:58582.service: Deactivated successfully. Apr 12 18:44:42.996182 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:44:42.996877 systemd-logind[1143]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:44:42.997783 systemd-logind[1143]: Removed session 12. Apr 12 18:44:43.058000 audit[4844]: USER_ACCT pid=4844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.059168 sshd[4844]: Accepted publickey for core from 139.178.89.65 port 58586 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:43.060000 audit[4844]: CRED_ACQ pid=4844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.060000 audit[4844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddae91d30 a2=3 a3=0 items=0 ppid=1 pid=4844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:43.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:43.068000 audit[4844]: USER_START pid=4844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.069000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.064597 systemd-logind[1143]: New session 13 of user core. Apr 12 18:44:43.060849 sshd[4844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:43.064621 systemd[1]: Started session-13.scope. Apr 12 18:44:43.296000 audit[4844]: USER_END pid=4844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.296000 audit[4844]: CRED_DISP pid=4844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.295980 sshd[4844]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:43.298521 systemd[1]: Started sshd@11-139.178.70.105:22-139.178.89.65:58602.service. Apr 12 18:44:43.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.105:22-139.178.89.65:58602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:43.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-139.178.89.65:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:43.300662 systemd-logind[1143]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:44:43.300801 systemd[1]: sshd@10-139.178.70.105:22-139.178.89.65:58586.service: Deactivated successfully. Apr 12 18:44:43.301207 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:44:43.301845 systemd-logind[1143]: Removed session 13. Apr 12 18:44:43.340333 sshd[4853]: Accepted publickey for core from 139.178.89.65 port 58602 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:43.341202 sshd[4853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:43.339000 audit[4853]: USER_ACCT pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.340000 audit[4853]: CRED_ACQ pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.340000 audit[4853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd92b30c40 a2=3 a3=0 items=0 ppid=1 pid=4853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:43.340000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:43.344119 systemd[1]: Started session-14.scope. Apr 12 18:44:43.344584 systemd-logind[1143]: New session 14 of user core. Apr 12 18:44:43.346000 audit[4853]: USER_START pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.347000 audit[4856]: CRED_ACQ pid=4856 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.440478 sshd[4853]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:43.440000 audit[4853]: USER_END pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.440000 audit[4853]: CRED_DISP pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:43.442044 systemd-logind[1143]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:44:43.442237 systemd[1]: sshd@11-139.178.70.105:22-139.178.89.65:58602.service: Deactivated successfully. Apr 12 18:44:43.442668 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:44:43.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.105:22-139.178.89.65:58602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:43.443390 systemd-logind[1143]: Removed session 14. Apr 12 18:44:48.447373 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:44:48.447454 kernel: audit: type=1130 audit(1712947488.442:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-139.178.89.65:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-139.178.89.65:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.443565 systemd[1]: Started sshd@12-139.178.70.105:22-139.178.89.65:46338.service. Apr 12 18:44:48.468000 audit[4879]: USER_ACCT pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.477873 kernel: audit: type=1101 audit(1712947488.468:1429): pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.477928 kernel: audit: type=1103 audit(1712947488.473:1430): pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.477947 kernel: audit: type=1006 audit(1712947488.473:1431): pid=4879 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:44:48.483285 kernel: audit: type=1300 audit(1712947488.473:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19b704b0 a2=3 a3=0 items=0 ppid=1 pid=4879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.473000 audit[4879]: CRED_ACQ pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.485105 kernel: audit: type=1327 audit(1712947488.473:1431): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:48.473000 audit[4879]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19b704b0 a2=3 a3=0 items=0 ppid=1 pid=4879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:48.473000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:48.485286 sshd[4879]: Accepted publickey for core from 139.178.89.65 port 46338 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:48.474866 sshd[4879]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:48.486979 systemd[1]: Started session-15.scope. Apr 12 18:44:48.487348 systemd-logind[1143]: New session 15 of user core. Apr 12 18:44:48.489000 audit[4879]: USER_START pid=4879 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.490000 audit[4881]: CRED_ACQ pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.497690 kernel: audit: type=1105 audit(1712947488.489:1432): pid=4879 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.497752 kernel: audit: type=1103 audit(1712947488.490:1433): pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.582841 sshd[4879]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:48.582000 audit[4879]: USER_END pid=4879 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.587554 kernel: audit: type=1106 audit(1712947488.582:1434): pid=4879 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.586000 audit[4879]: CRED_DISP pid=4879 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.590710 kernel: audit: type=1104 audit(1712947488.586:1435): pid=4879 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:48.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-139.178.89.65:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.591888 systemd[1]: sshd@12-139.178.70.105:22-139.178.89.65:46338.service: Deactivated successfully. Apr 12 18:44:48.592341 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:44:48.592566 systemd-logind[1143]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:44:48.593174 systemd-logind[1143]: Removed session 15. Apr 12 18:44:50.485901 systemd[1]: run-containerd-runc-k8s.io-f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771-runc.qtfYuq.mount: Deactivated successfully. Apr 12 18:44:53.297634 systemd[1]: run-containerd-runc-k8s.io-3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57-runc.1acPpb.mount: Deactivated successfully. Apr 12 18:44:53.314180 systemd[1]: run-containerd-runc-k8s.io-16387963cf7094b95a97e7d80aee271ecab27f78042f6f2e191e39ab4e80d00e-runc.xSjh5I.mount: Deactivated successfully. Apr 12 18:44:53.347217 kubelet[2145]: I0412 18:44:53.347063 2145 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7545cf7758-clvtt" podStartSLOduration=29.061721879 podStartE2EDuration="31.347017639s" podCreationTimestamp="2024-04-12 18:44:22 +0000 UTC" firstStartedPulling="2024-04-12 18:44:23.529060342 +0000 UTC m=+80.976990607" lastFinishedPulling="2024-04-12 18:44:25.814356101 +0000 UTC m=+83.262286367" observedRunningTime="2024-04-12 18:44:26.898084433 +0000 UTC m=+84.346014700" watchObservedRunningTime="2024-04-12 18:44:53.347017639 +0000 UTC m=+110.794947909" Apr 12 18:44:53.380000 audit[4950]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:53.380000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc75e7a20 a2=0 a3=7ffcc75e7a0c items=0 ppid=2276 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:53.381000 audit[4950]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:53.381000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcc75e7a20 a2=0 a3=7ffcc75e7a0c items=0 ppid=2276 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:53.388000 audit[4952]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:53.388000 audit[4952]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed3db35f0 a2=0 a3=7ffed3db35dc items=0 ppid=2276 pid=4952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:53.389000 audit[4952]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:53.389000 audit[4952]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffed3db35f0 a2=0 a3=7ffed3db35dc items=0 ppid=2276 pid=4952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:53.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-139.178.89.65:46340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:53.587954 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:44:53.588002 kernel: audit: type=1130 audit(1712947493.585:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-139.178.89.65:46340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:53.586484 systemd[1]: Started sshd@13-139.178.70.105:22-139.178.89.65:46340.service. Apr 12 18:44:53.662000 audit[4955]: USER_ACCT pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.664602 sshd[4955]: Accepted publickey for core from 139.178.89.65 port 46340 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:53.668988 kernel: audit: type=1101 audit(1712947493.662:1442): pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.667000 audit[4955]: CRED_ACQ pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.676159 kernel: audit: type=1103 audit(1712947493.667:1443): pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.676203 kernel: audit: type=1006 audit(1712947493.667:1444): pid=4955 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:44:53.680527 kernel: audit: type=1300 audit(1712947493.667:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca5fce420 a2=3 a3=0 items=0 ppid=1 pid=4955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.680570 kernel: audit: type=1327 audit(1712947493.667:1444): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:53.667000 audit[4955]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca5fce420 a2=3 a3=0 items=0 ppid=1 pid=4955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:53.682161 sshd[4955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:53.686251 systemd[1]: Started session-16.scope. Apr 12 18:44:53.686446 systemd-logind[1143]: New session 16 of user core. Apr 12 18:44:53.687000 audit[4955]: USER_START pid=4955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.692000 audit[4957]: CRED_ACQ pid=4957 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.696245 kernel: audit: type=1105 audit(1712947493.687:1445): pid=4955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.696275 kernel: audit: type=1103 audit(1712947493.692:1446): pid=4957 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.806759 sshd[4955]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:53.806000 audit[4955]: USER_END pid=4955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.811392 systemd[1]: sshd@13-139.178.70.105:22-139.178.89.65:46340.service: Deactivated successfully. Apr 12 18:44:53.811635 kernel: audit: type=1106 audit(1712947493.806:1447): pid=4955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.811875 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:44:53.806000 audit[4955]: CRED_DISP pid=4955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.815138 systemd-logind[1143]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:44:53.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-139.178.89.65:46340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:53.815576 kernel: audit: type=1104 audit(1712947493.806:1448): pid=4955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:53.815812 systemd-logind[1143]: Removed session 16. Apr 12 18:44:56.352000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:56.352000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:56.352000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00296f2a0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:56.352000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:56.352000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f45170 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:44:56.352000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:58.812556 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:44:58.812826 kernel: audit: type=1130 audit(1712947498.809:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-139.178.89.65:56262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:58.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-139.178.89.65:56262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:58.810695 systemd[1]: Started sshd@14-139.178.70.105:22-139.178.89.65:56262.service. Apr 12 18:44:58.839000 audit[4974]: USER_ACCT pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.841625 sshd[4974]: Accepted publickey for core from 139.178.89.65 port 56262 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:58.846563 kernel: audit: type=1101 audit(1712947498.839:1453): pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.845000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.847263 sshd[4974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:58.853642 kernel: audit: type=1103 audit(1712947498.845:1454): pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.858225 kernel: audit: type=1006 audit(1712947498.845:1455): pid=4974 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 18:44:58.858262 kernel: audit: type=1300 audit(1712947498.845:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec355b260 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:58.858291 kernel: audit: type=1327 audit(1712947498.845:1455): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:58.845000 audit[4974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec355b260 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:58.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:58.860579 systemd-logind[1143]: New session 17 of user core. Apr 12 18:44:58.861275 systemd[1]: Started session-17.scope. Apr 12 18:44:58.863000 audit[4974]: USER_START pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.867000 audit[4976]: CRED_ACQ pid=4976 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.871663 kernel: audit: type=1105 audit(1712947498.863:1456): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.871694 kernel: audit: type=1103 audit(1712947498.867:1457): pid=4976 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.962509 sshd[4974]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:58.962000 audit[4974]: USER_END pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.968253 systemd[1]: Started sshd@15-139.178.70.105:22-139.178.89.65:56268.service. Apr 12 18:44:58.968578 kernel: audit: type=1106 audit(1712947498.962:1458): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.968613 kernel: audit: type=1104 audit(1712947498.962:1459): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.962000 audit[4974]: CRED_DISP pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:58.971972 systemd[1]: sshd@14-139.178.70.105:22-139.178.89.65:56262.service: Deactivated successfully. Apr 12 18:44:58.974192 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:44:58.974974 systemd-logind[1143]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:44:58.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-139.178.89.65:56268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:58.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-139.178.89.65:56262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:58.975878 systemd-logind[1143]: Removed session 17. Apr 12 18:44:59.008000 audit[4985]: USER_ACCT pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.009000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.011086 sshd[4985]: Accepted publickey for core from 139.178.89.65 port 56268 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:59.009000 audit[4985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff81ba8710 a2=3 a3=0 items=0 ppid=1 pid=4985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.009000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:59.011533 sshd[4985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:59.014631 systemd-logind[1143]: New session 18 of user core. Apr 12 18:44:59.015093 systemd[1]: Started session-18.scope. Apr 12 18:44:59.021000 audit[4985]: USER_START pid=4985 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.022000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.407000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:59.407000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00d322450 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:44:59.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:59.420000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:59.420000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:59.420000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00bcd5580 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:44:59.420000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00d3224b0 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:44:59.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:59.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:59.420000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8229 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:59.420000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c007e5e360 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:44:59.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:59.420000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8225 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:59.420000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c007e5e420 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:44:59.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:59.427000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:59.427000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00bcd5740 a2=fc6 a3=0 items=0 ppid=1832 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c702 key=(null) Apr 12 18:44:59.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 18:44:59.573975 sshd[4985]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:59.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-139.178.89.65:56280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:59.576300 systemd[1]: Started sshd@16-139.178.70.105:22-139.178.89.65:56280.service. Apr 12 18:44:59.576000 audit[4985]: USER_END pid=4985 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.576000 audit[4985]: CRED_DISP pid=4985 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.586125 systemd[1]: sshd@15-139.178.70.105:22-139.178.89.65:56268.service: Deactivated successfully. Apr 12 18:44:59.586559 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:44:59.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-139.178.89.65:56268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:59.587355 systemd-logind[1143]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:44:59.588003 systemd-logind[1143]: Removed session 18. Apr 12 18:44:59.618000 audit[4995]: USER_ACCT pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.620005 sshd[4995]: Accepted publickey for core from 139.178.89.65 port 56280 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:44:59.619000 audit[4995]: CRED_ACQ pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.619000 audit[4995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5b47eab0 a2=3 a3=0 items=0 ppid=1 pid=4995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:59.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:59.621324 sshd[4995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:59.625083 systemd[1]: Started session-19.scope. Apr 12 18:44:59.625519 systemd-logind[1143]: New session 19 of user core. Apr 12 18:44:59.627000 audit[4995]: USER_START pid=4995 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:44:59.629000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.019000 audit[5008]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.019000 audit[5008]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcb4130a30 a2=0 a3=7ffcb4130a1c items=0 ppid=2276 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:01.021000 audit[5008]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.021000 audit[5008]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcb4130a30 a2=0 a3=7ffcb4130a1c items=0 ppid=2276 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:01.044344 systemd[1]: Started sshd@17-139.178.70.105:22-139.178.89.65:56282.service. Apr 12 18:45:01.041000 audit[5010]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.041000 audit[5010]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcc7e35580 a2=0 a3=7ffcc7e3556c items=0 ppid=2276 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:01.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-139.178.89.65:56282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:01.044000 audit[5010]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.044000 audit[5010]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcc7e35580 a2=0 a3=0 items=0 ppid=2276 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:01.052043 sshd[4995]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:01.057000 audit[4995]: USER_END pid=4995 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.083000 audit[4995]: CRED_DISP pid=4995 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.125897 systemd[1]: sshd@16-139.178.70.105:22-139.178.89.65:56280.service: Deactivated successfully. Apr 12 18:45:01.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-139.178.89.65:56280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:01.127365 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:45:01.128161 systemd-logind[1143]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:45:01.129599 systemd-logind[1143]: Removed session 19. Apr 12 18:45:01.179865 sshd[5012]: Accepted publickey for core from 139.178.89.65 port 56282 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:01.178000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.179000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.179000 audit[5012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff55ab4ac0 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.179000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:01.185823 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:01.190085 systemd[1]: Started session-20.scope. Apr 12 18:45:01.190295 systemd-logind[1143]: New session 20 of user core. Apr 12 18:45:01.192000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.192000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.684157 systemd[1]: Started sshd@18-139.178.70.105:22-139.178.89.65:56284.service. Apr 12 18:45:01.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-139.178.89.65:56284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:01.685790 sshd[5012]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:01.684000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.684000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.687430 systemd[1]: sshd@17-139.178.70.105:22-139.178.89.65:56282.service: Deactivated successfully. Apr 12 18:45:01.687899 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:45:01.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-139.178.89.65:56282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:01.688688 systemd-logind[1143]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:45:01.689151 systemd-logind[1143]: Removed session 20. Apr 12 18:45:01.733000 audit[5022]: USER_ACCT pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.735690 sshd[5022]: Accepted publickey for core from 139.178.89.65 port 56284 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:01.734000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.734000 audit[5022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6659db40 a2=3 a3=0 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:01.736231 sshd[5022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:01.739697 systemd[1]: Started session-21.scope. Apr 12 18:45:01.739948 systemd-logind[1143]: New session 21 of user core. Apr 12 18:45:01.741000 audit[5022]: USER_START pid=5022 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.742000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.843026 sshd[5022]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:01.842000 audit[5022]: USER_END pid=5022 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.842000 audit[5022]: CRED_DISP pid=5022 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:01.844885 systemd[1]: sshd@18-139.178.70.105:22-139.178.89.65:56284.service: Deactivated successfully. Apr 12 18:45:01.845323 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:45:01.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-139.178.89.65:56284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:01.845910 systemd-logind[1143]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:45:01.846400 systemd-logind[1143]: Removed session 21. Apr 12 18:45:03.927266 systemd[1]: run-containerd-runc-k8s.io-e4a317a2ee009ba4a8c37ca12a7363807ea08c43443a4d52480406a9af2c7477-runc.txoh9a.mount: Deactivated successfully. Apr 12 18:45:06.846553 systemd[1]: Started sshd@19-139.178.70.105:22-139.178.89.65:56290.service. Apr 12 18:45:06.851563 kernel: kauditd_printk_skb: 75 callbacks suppressed Apr 12 18:45:06.855949 kernel: audit: type=1130 audit(1712947506.846:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-139.178.89.65:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:06.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-139.178.89.65:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:07.110000 audit[5061]: USER_ACCT pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.117771 kernel: audit: type=1101 audit(1712947507.110:1508): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.117814 kernel: audit: type=1103 audit(1712947507.113:1509): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.117834 kernel: audit: type=1006 audit(1712947507.113:1510): pid=5061 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:45:07.113000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.117933 sshd[5061]: Accepted publickey for core from 139.178.89.65 port 56290 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:07.113000 audit[5061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbcc7c40 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:07.123493 kernel: audit: type=1300 audit(1712947507.113:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbcc7c40 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:07.123564 kernel: audit: type=1327 audit(1712947507.113:1510): proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:07.113000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:07.123711 sshd[5061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:07.127915 systemd-logind[1143]: New session 22 of user core. Apr 12 18:45:07.128489 systemd[1]: Started session-22.scope. Apr 12 18:45:07.131000 audit[5061]: USER_START pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.135000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.139694 kernel: audit: type=1105 audit(1712947507.131:1511): pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.139761 kernel: audit: type=1103 audit(1712947507.135:1512): pid=5063 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.265472 sshd[5061]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:07.265000 audit[5061]: USER_END pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.267534 systemd[1]: sshd@19-139.178.70.105:22-139.178.89.65:56290.service: Deactivated successfully. Apr 12 18:45:07.273878 kernel: audit: type=1106 audit(1712947507.265:1513): pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.273908 kernel: audit: type=1104 audit(1712947507.266:1514): pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.266000 audit[5061]: CRED_DISP pid=5061 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:07.268086 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:45:07.270610 systemd-logind[1143]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:45:07.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-139.178.89.65:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:07.274197 systemd-logind[1143]: Removed session 22. Apr 12 18:45:08.040000 audit[5078]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:08.040000 audit[5078]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff65169770 a2=0 a3=7fff6516975c items=0 ppid=2276 pid=5078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:08.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:08.042000 audit[5078]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:08.042000 audit[5078]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff65169770 a2=0 a3=7fff6516975c items=0 ppid=2276 pid=5078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:08.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:12.269353 systemd[1]: Started sshd@20-139.178.70.105:22-139.178.89.65:35676.service. Apr 12 18:45:12.275300 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:45:12.275338 kernel: audit: type=1130 audit(1712947512.268:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-139.178.89.65:35676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:12.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-139.178.89.65:35676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:12.313000 audit[5081]: USER_ACCT pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.314857 sshd[5081]: Accepted publickey for core from 139.178.89.65 port 35676 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:12.318570 kernel: audit: type=1101 audit(1712947512.313:1519): pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.318000 audit[5081]: CRED_ACQ pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.319070 sshd[5081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:12.323881 kernel: audit: type=1103 audit(1712947512.318:1520): pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.323929 kernel: audit: type=1006 audit(1712947512.318:1521): pid=5081 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:45:12.318000 audit[5081]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddef533a0 a2=3 a3=0 items=0 ppid=1 pid=5081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:12.327336 kernel: audit: type=1300 audit(1712947512.318:1521): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddef533a0 a2=3 a3=0 items=0 ppid=1 pid=5081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:12.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:12.329570 kernel: audit: type=1327 audit(1712947512.318:1521): proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:12.330966 systemd-logind[1143]: New session 23 of user core. Apr 12 18:45:12.331570 systemd[1]: Started session-23.scope. Apr 12 18:45:12.334000 audit[5081]: USER_START pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.339025 kernel: audit: type=1105 audit(1712947512.334:1522): pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.339069 kernel: audit: type=1103 audit(1712947512.338:1523): pid=5083 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.338000 audit[5083]: CRED_ACQ pid=5083 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.500175 sshd[5081]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:12.500000 audit[5081]: USER_END pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.502034 systemd[1]: sshd@20-139.178.70.105:22-139.178.89.65:35676.service: Deactivated successfully. Apr 12 18:45:12.502577 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:45:12.500000 audit[5081]: CRED_DISP pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.508110 kernel: audit: type=1106 audit(1712947512.500:1524): pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.508164 kernel: audit: type=1104 audit(1712947512.500:1525): pid=5081 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:12.508233 systemd-logind[1143]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:45:12.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-139.178.89.65:35676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:12.508869 systemd-logind[1143]: Removed session 23. Apr 12 18:45:14.339000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:14.339000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:14.339000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cffda0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:45:14.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:14.339000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000fb6400 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:45:14.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:14.339000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:14.339000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000fb6420 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:45:14.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:14.347000 audit[2035]: AVC avc: denied { watch } for pid=2035 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8223 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:14.347000 audit[2035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cfffa0 a2=fc6 a3=0 items=0 ppid=1896 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c746 key=(null) Apr 12 18:45:14.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:17.503122 systemd[1]: Started sshd@21-139.178.70.105:22-139.178.89.65:57710.service. Apr 12 18:45:17.516059 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:45:17.516115 kernel: audit: type=1130 audit(1712947517.502:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-139.178.89.65:57710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:17.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-139.178.89.65:57710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:17.584000 audit[5100]: USER_ACCT pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.595485 kernel: audit: type=1101 audit(1712947517.584:1532): pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.602962 kernel: audit: type=1103 audit(1712947517.590:1533): pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.609122 kernel: audit: type=1006 audit(1712947517.590:1534): pid=5100 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:45:17.609216 kernel: audit: type=1300 audit(1712947517.590:1534): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8573aa50 a2=3 a3=0 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:17.609241 kernel: audit: type=1327 audit(1712947517.590:1534): proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:17.590000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.590000 audit[5100]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8573aa50 a2=3 a3=0 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:17.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:17.615000 audit[5100]: USER_START pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.616550 sshd[5100]: Accepted publickey for core from 139.178.89.65 port 57710 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:17.597720 sshd[5100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:17.604328 systemd-logind[1143]: New session 24 of user core. Apr 12 18:45:17.605213 systemd[1]: Started session-24.scope. Apr 12 18:45:17.618000 audit[5102]: CRED_ACQ pid=5102 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.622484 kernel: audit: type=1105 audit(1712947517.615:1535): pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.622513 kernel: audit: type=1103 audit(1712947517.618:1536): pid=5102 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.782724 sshd[5100]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:17.783000 audit[5100]: USER_END pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.787409 systemd[1]: sshd@21-139.178.70.105:22-139.178.89.65:57710.service: Deactivated successfully. Apr 12 18:45:17.787555 kernel: audit: type=1106 audit(1712947517.783:1537): pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.787872 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:45:17.783000 audit[5100]: CRED_DISP pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.788683 systemd-logind[1143]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:45:17.789156 systemd-logind[1143]: Removed session 24. Apr 12 18:45:17.800069 kernel: audit: type=1104 audit(1712947517.783:1538): pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:17.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-139.178.89.65:57710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:20.485024 systemd[1]: run-containerd-runc-k8s.io-f3dfd305a624126d3f85407531ce7ac0e591317f2237ad5a3efe1fe03616b771-runc.aWsKIE.mount: Deactivated successfully. Apr 12 18:45:22.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-139.178.89.65:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:22.785777 systemd[1]: Started sshd@22-139.178.70.105:22-139.178.89.65:57714.service. Apr 12 18:45:22.786845 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:45:22.790252 kernel: audit: type=1130 audit(1712947522.785:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-139.178.89.65:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:22.896000 audit[5145]: USER_ACCT pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.898744 sshd[5145]: Accepted publickey for core from 139.178.89.65 port 57714 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:22.900000 audit[5145]: CRED_ACQ pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.906446 kernel: audit: type=1101 audit(1712947522.896:1541): pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.906475 kernel: audit: type=1103 audit(1712947522.900:1542): pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.906492 kernel: audit: type=1006 audit(1712947522.900:1543): pid=5145 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:45:22.906507 kernel: audit: type=1300 audit(1712947522.900:1543): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3d60e0f0 a2=3 a3=0 items=0 ppid=1 pid=5145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:22.909819 kernel: audit: type=1327 audit(1712947522.900:1543): proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:22.900000 audit[5145]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3d60e0f0 a2=3 a3=0 items=0 ppid=1 pid=5145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:22.900000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:22.910662 sshd[5145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:22.914055 systemd[1]: Started session-25.scope. Apr 12 18:45:22.914719 systemd-logind[1143]: New session 25 of user core. Apr 12 18:45:22.917000 audit[5145]: USER_START pid=5145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.921000 audit[5147]: CRED_ACQ pid=5147 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.925116 kernel: audit: type=1105 audit(1712947522.917:1544): pid=5145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:22.925153 kernel: audit: type=1103 audit(1712947522.921:1545): pid=5147 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:23.059176 sshd[5145]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:23.060000 audit[5145]: USER_END pid=5145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:23.065676 kernel: audit: type=1106 audit(1712947523.060:1546): pid=5145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:23.065000 audit[5145]: CRED_DISP pid=5145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:23.070252 systemd[1]: sshd@22-139.178.70.105:22-139.178.89.65:57714.service: Deactivated successfully. Apr 12 18:45:23.070680 kernel: audit: type=1104 audit(1712947523.065:1547): pid=5145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:23.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-139.178.89.65:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:23.070817 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:45:23.071460 systemd-logind[1143]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:45:23.072023 systemd-logind[1143]: Removed session 25. Apr 12 18:45:23.299301 systemd[1]: run-containerd-runc-k8s.io-3453f9260f4e6306a8a866bd0b86c85e5d919769c23b705b6b7eafd853e1ad57-runc.w6tDu1.mount: Deactivated successfully. Apr 12 18:45:24.292251 systemd[1]: run-containerd-runc-k8s.io-16387963cf7094b95a97e7d80aee271ecab27f78042f6f2e191e39ab4e80d00e-runc.yy1ano.mount: Deactivated successfully. Apr 12 18:45:26.397000 audit[4698]: AVC avc: denied { watch } for pid=4698 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_44_23.1394506619/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c846 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c140,c846 tclass=file permissive=0 Apr 12 18:45:26.397000 audit[4698]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009c57e0 a2=fc6 a3=0 items=0 ppid=4564 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c846 key=(null) Apr 12 18:45:26.397000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:45:26.518000 audit[4740]: AVC avc: denied { watch } for pid=4740 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_44_23.2533224258/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c204,c863 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c204,c863 tclass=file permissive=0 Apr 12 18:45:26.518000 audit[4740]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1b5c0 a2=fc6 a3=0 items=0 ppid=4606 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c204,c863 key=(null) Apr 12 18:45:26.518000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:45:28.061617 systemd[1]: Started sshd@23-139.178.70.105:22-139.178.89.65:50490.service. Apr 12 18:45:28.067610 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:45:28.067655 kernel: audit: type=1130 audit(1712947528.060:1551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.105:22-139.178.89.65:50490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:28.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.105:22-139.178.89.65:50490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:28.168000 audit[5218]: USER_ACCT pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.170600 sshd[5218]: Accepted publickey for core from 139.178.89.65 port 50490 ssh2: RSA SHA256:TtQieuqcCDQXmSjfgq9Z2d0am1vSz1z6IxHwYYH5Hmc Apr 12 18:45:28.171000 audit[5218]: CRED_ACQ pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.173644 sshd[5218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:28.176118 kernel: audit: type=1101 audit(1712947528.168:1552): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.176162 kernel: audit: type=1103 audit(1712947528.171:1553): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.178155 kernel: audit: type=1006 audit(1712947528.171:1554): pid=5218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:45:28.171000 audit[5218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ee74230 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:28.181526 kernel: audit: type=1300 audit(1712947528.171:1554): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ee74230 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:28.171000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:28.183852 kernel: audit: type=1327 audit(1712947528.171:1554): proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:28.183914 systemd-logind[1143]: New session 26 of user core. Apr 12 18:45:28.184322 systemd[1]: Started session-26.scope. Apr 12 18:45:28.187000 audit[5218]: USER_START pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.191000 audit[5225]: CRED_ACQ pid=5225 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.195836 kernel: audit: type=1105 audit(1712947528.187:1555): pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.195926 kernel: audit: type=1103 audit(1712947528.191:1556): pid=5225 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.322156 sshd[5218]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:28.321000 audit[5218]: USER_END pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.326921 systemd[1]: sshd@23-139.178.70.105:22-139.178.89.65:50490.service: Deactivated successfully. Apr 12 18:45:28.327394 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:45:28.327554 kernel: audit: type=1106 audit(1712947528.321:1557): pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.322000 audit[5218]: CRED_DISP pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.105:22-139.178.89.65:50490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:28.330837 systemd-logind[1143]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:45:28.331557 kernel: audit: type=1104 audit(1712947528.322:1558): pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:28.331658 systemd-logind[1143]: Removed session 26.